Skip to main content

Security Based Operation in Container Line Supply Chain: a Literature Review

  • Chapter
  • First Online:
Decision Aid Models for Disaster Management and Emergencies

Part of the book series: Atlantis Computational Intelligence Systems ((ATLANTISCIS,volume 7))

Abstract

Container Line Supply Chain (CLSC) plays a dominant role in world cargo transportation, but also subjects to various threats during its operation due to its inherent features. The threats can not only cause disruptions for CLSC operation, they may also lead to various disasters globally. To help to manage the potential disasters, in this chapter, current research on security for CLSC operation is reviewed. Specifically, the research is divided into three categories: (1) research from a general level, including standards, regulations, codes, etc. issued by international, national and industrial organizations, aiming at improving CLSC security, (2) research on specific security issues in CLSC, e.g., threats faced by CLSC, features of CLSC, criteria for security assessment of CLSC, etc., and (3) research on different risk analysis tools and their applications in CLSC security related areas. Further, the limitations of current research are also analyzed and potential directions for future research in this field are suggested.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. J.O. Aagedal, F. Braber, T. Dimitrakos, B.A. Gran, D. Raptis and K. Stolen, “Model-based risk assessment to improve enterprise security,” Proceedings of the Sixth International Enterprise Distributed Object Computing Conference, Lausanne, Switzerland, pp. 51–62, 2002.

    Google Scholar 

  2. V. Agarwal and S. Seshadri, “Risk intermediation in supply chains”, IIE Transactions, Vol. 32, No. 9, pp. 819–831, 2000.

    Google Scholar 

  3. N.J. Bahr, “System safety engineering and risk assessment”, Taylor & Francis: London, 1997.

    Google Scholar 

  4. N.O. Bakir, “A brief analysis of threats and vulnerabilities in the maritime domain”, in I. Linkov et al. (eds.), Managing Critical Infrastructure Risks, Springer: Netherlands, pp. 17–49, 2007.

    Google Scholar 

  5. R. Banomyong, “The impact of port and trade security initiatives on maritime supply chain management”, Maritime Policy & Management, Vol. 32, No. 1, pp. 3–13, 2005.

    Google Scholar 

  6. Ø. Berleetal, B.E. Asbjørnslett and J.B. Rice, “Formal Vulnerability Assessment of a maritime transportation system”, Reliability Engineering and System Safety, Vol. 96, pp. 696–705, 2011.

    Google Scholar 

  7. K. Bichou, “Security and risk-based models in shipping and ports: review and critical analysis”, OECD International Transport Forum, Discussion Paper No. 2008-20, 2008. November 27, 2012 23:14 Atlantis Press Book - 9.75in x 6.5in book_Vitoriano-Montero 112 Decision Aid Models for Disaster Management and Emergencies.

    Google Scholar 

  8. S.A. Butler, “Security attribute evaluation method: a cost-benefit approach”, Proceedings of the 24th International Conference on Software Engineering, Florida, U.S., pp. 232–240, 2002.

    Google Scholar 

  9. CBP, “Container Security Initiative”, Custom Border Protection, 2002a.

    Google Scholar 

  10. CBP, “Customs-Trade Partnership Against Terrorism”, Custom Border Protection, 2002b.

    Google Scholar 

  11. S. Chopra and P. Meindl, “Supply chain management: strategy, planning and operations”, 2nd edition, Pearson Prentice Hall: New Jersey, 2004.

    Google Scholar 

  12. M. Christopher and H. Lee, “Mitigating supply chain risk through improved confidence”, International Journal of Physical Distribution & Logistics Management, Vol. 34, No. 5, pp. 388–96, 2004.

    Google Scholar 

  13. D. Closs and E. McGarrell, “Enhancing Security Throughout the supply chain”, IBM Center for the Business of Government Special Report Series, 2004.

    Google Scholar 

  14. S. Cooperman, “Tracking Cargo”, Security, Vol. 41, No. 8, pp. 20–22, 2004.

    Google Scholar 

  15. M. David, “Editorial; High-tech tracking tools secure incoming cargo”, Electronic Design, Feb. 17, 2005.

    Google Scholar 

  16. DHS, “Strategy to Enhance International Supply Chain Security”, U.S. Department of Homeland Security, 2007.

    Google Scholar 

  17. EC, “Commission Regulation (EC) No. 884/2005: laying down procedures for conducting Commission inspections in the field of maritime security”, European Commission, 2005a.

    Google Scholar 

  18. EC, “Directive 2005/65/EC of the European Parliament and of the Council on Enhancing Port Security”, European Commission, 2005b.

    Google Scholar 

  19. EC, “Regulation (EC) No. 725/2004 of the European Parliament and of the Council on Enhancing Ship and Port Facility Security”, European Commission, 2004.

    Google Scholar 

  20. D.G. Firesmith, “Common Concepts Underlying Safety, Security, and Survivability Engineering”, Technical Report CMU/SEI-2003-TN-033, Carnegie Mellon Software Engineering Institute, 2003.

    Google Scholar 

  21. J.C. Fransoo and C.Y. Lee, “Ocean container transport: an underestimated and critical link in global supply chain performance”, Production and Operations Management, in press, 2011.

    Google Scholar 

  22. GAO, “Container Security: Expansion of Key Customs Programs Will Require Greater Attention to Critical Success Factors”, Government Accountability Office Report, GAO-03-770, 2003.

    Google Scholar 

  23. GAO, “Container Security: A Flexible Staffing Model and Minimum Equipment Requirements Would Improve Overseas Targeting and Inspection Efforts”, Government Accountability Office Report, GAO-05-557, 2005.

    Google Scholar 

  24. GAO, “Supply Chain Security: Examinations of High Risk Cargo at Foreign Seaports Have Increased, but Improved Data Collection and Performance Measures Are Needed”, Government Accountability Office Report, GAO-08-187, 2008.

    Google Scholar 

  25. G. Giaglis, I. Minis, A. Tatarakis and V. Ziempekis, “Minimizing logistics risk through real time vehicle routing and mobile technologies”, International Journal of Physical Distribution & Logistics Management, Vol. 34, No. 9, pp. 749–64, 2004.

    Google Scholar 

  26. J.S. Helmick, “Port and maritime security: A research perspective”, Journal of Transportation Security, Vol. 1, No. 1, pp. 15–28, 2008.

    Google Scholar 

  27. A.G. Hessami,”A Systems Framework for Safety and Security: The Holistic Paradigm”. Systems Engineering, 7(2), pp. 99–112, 2004.

    Google Scholar 

  28. IMO, “International Ship and Port Facility Security Code”, International Maritime Organization, 2002a.

    Google Scholar 

  29. IMO, “Guidelines for Formal Safety Assessment for Use in the IMO Rule-making process”, IMO, 2002b.

    Google Scholar 

  30. ISO, “ISO 28000:2007: Specification for security management systems for the supply chain”, International Organization for Standardization, 2007a. November 27, 2012 23:14 Atlantis Press Book - 9.75in x 6.5in book_Vitoriano-Montero Bibliography 113.

    Google Scholar 

  31. ISO, “ISO 28001:2007: Security management systems for the supply chain – Best practices for implementing supply chain security, assessments and plans – Requirements and guidance”, International Organization for Standardization, 2007b.

    Google Scholar 

  32. ISO, “ISO 28003:2007: Security management systems for the supply chain – Requirements for bodies providing audit and certification of supply chain security management systems”, International Organization for Standardization, 2007c.

    Google Scholar 

  33. ISO, “ISO 28004:2007: Security management systems for the supply chain – Guidelines for the implementation of ISO 28000”, International Organization for Standardization, 2007d.

    Google Scholar 

  34. ITPWG, “The International Shippers and Freight Forwarders Security Code”, International Trade Procedures Working Group of United Nations Centre for Trade Facilitation and Electronic Business, 2003.

    Google Scholar 

  35. E. Jonsson, “An integrated framework for security and dependability”, In Proceedings of the New Security Paradigms Workshop, pages 22–25, Charlottesville, VA, USA, September 1998.

    Google Scholar 

  36. O. Khan and B. Burnes, “Risk and supply chain management: creating a research agenda”, The International Journal of Logistics Management, Vol. 18 No. 2, pp. 197–216, 2007.

    Google Scholar 

  37. O. Khan, M. Christopher and B. Burnes, “The impact of product design on supply chain risk: a case study”, International Journal of Physical Distribution & Logistics Management, Vol. 38 No. 5, pp. 412–32, 2008.

    Google Scholar 

  38. S.J. Kim, G.F. Deng, S.K.S. Gupta, M. Murphy-Hoye, “Intelligent networked containers for enhancing global supply chain security and enabling new commercial value”, the 3rd International Conference on Communication System Software and Middleware, Bangalore, Jan.6-10, 2008, pp. 662–669.

    Google Scholar 

  39. C.A. Kontovas and H.N. Psaraftis, “Formal Safety Assessment: A Critical Review”, Marine Technology, Vol. 46, No. 1, pp. 45–59, 2009.

    Google Scholar 

  40. O. Lau, “The ten commandments of security”, Computers & Security, Vol. 17, Issue. 2, pp. 119–123, 1998.

    Google Scholar 

  41. K.X. Li and K. Cullinane, “An Economic Approach to Maritime Risk Management and Safety Regulation”, Maritime Economics and Logistics, Vol. 5, No. 3, pp. 268–284, 2003.

    Google Scholar 

  42. H.L. Lee and M. Wolfe, “Supply chain security without tears”, Supply Chain Management Review, Vol. 7, No. 1, pp. 12–20, 2003.

    Google Scholar 

  43. M. Levinson, “The box: How the shipping container made the world smaller and the world economy bigger”, Princeton University Press: Princeton, 2006.

    Google Scholar 

  44. J. Liu, J.B. Yang, J. Wang and H.S. Sii, “Engineering system safety analysis and synthesis using fuzzy rule-based evidential reasoning approach”, Quality and Reliability Engineering International, Vol. 21, pp. 387–411, 2005.

    Google Scholar 

  45. P. Lois, J. Wang, A. Wall and T. Ruxton, “Formal safety assessment for cruise ships”, Tourism Management, Vol. 25, pp. 93–109, 2004.

    Google Scholar 

  46. LRQA, “Supply Chain Security Management Systems and the role of the Assurance Provider”, Lloyd’s Register Quality Assurance, 2009.

    Google Scholar 

  47. Manuj and J.T.Mentzer, “Global supply chain risk management”, Journal of Business Logistics, Vol. 29, No. 1, pp. 133–56, 2008.

    Google Scholar 

  48. E. McCormack, M. Jensen, and A. Hovde, “Evaluating the Use of Electronic Door Seals (E-Seals) on Shipping Containers”, International Journal of Applied Logistics, 1 (4), 13–29, October-December 2010.

    Google Scholar 

  49. S. Noda, “Container Shipping and Security Issues: the Carriers’ Responsibility in the Fight against Terrorism”, Maritime Economics & Logistics, Vol. 6, No. 2, pp. 157–186, 2004.

    Google Scholar 

  50. OECD, “Security in Maritime Transport: Risk Factors and Economic Impact”, Organisation for Economic Co-operation and Development Report, 2003.

    Google Scholar 

  51. OECD, “Report on Container Transport Security across modes: Executive Summary and Conclusions”, Organisation for Economic Co-operation and Development Report, 2004. November 27, 2012 23:14 Atlantis Press Book - 9.75in x 6.5in book_Vitoriano-Montero 114 Decision Aid Models for Disaster Management and Emergencies.

    Google Scholar 

  52. OECD, “Container Transport Security across Modes”, Organisation for Economic Cooperation and Development Report, 2005.

    Google Scholar 

  53. R.R. Pai, V.R. Kallepalli, R.J. Caudill and M.C. Zhou, “Methods toward supply chain risk analysis”, IEEE International Conference on Systems, Man and Cybernetics, Vol. 5, Washington, U.S., pp. 4560–4565, 2003.

    Google Scholar 

  54. U. Paulsson, “Managing risks in supply chains: an article review”, Presented at NOFOMA, Oulu, Finland, 2003.

    Google Scholar 

  55. PECC, “Study on the Mutually Supportive Advancement of APEC’S Trade Facilitation and Secure Trade Goals post September 11”, Analysis and Case Studies prepared for APEC, Singapore Pacific Economic Cooperation Council, 2004.

    Google Scholar 

  56. M. Perry, “Natural disaster management planning: a study of logistics managers responding to the tsunami”, International Journal of Physical Distribution & Logistics Management, Vol. 37, No. 5, pp. 409–33, 2007.

    Google Scholar 

  57. C.H. Piersall, “Securing the global supply chain”, ISO Focus, October, pp. 33–35, 2007.

    Google Scholar 

  58. C.A. Pinto, G. Rabadi and W.K. Talley, “U.S. Port Security”, in W.K. Talley. (eds.), “Maritime Safety Security and Piracy”, Informa: London, 2008.

    Google Scholar 

  59. H.N. Psaraftis, “EU Ports Policy: Where do we Go from Here?”, Maritime Economics & Logistics, Vol. 7, No. 1, pp. 73–82, 2005.

    Google Scholar 

  60. S. Rao and T. Goldsby, “Supply chain risks: a review and typology”, The International Journal of Logistics Management, Vol. 20, No. 1, pp. 97–123, 2009.

    Google Scholar 

  61. J. Ren, I. Jenkinson, H.S. Sii, J. Wang, D.L. Xu and J.B. Yang, “An offshore safety assessment framework using fuzzy reasoning and evidential synthesis approaches”, Journal of Marine Engineering & Technology, No. A6, pp. 3–16, 2005.

    Google Scholar 

  62. J. Ren, J. Wang, I. Jenkinson, D. L. Xu, J. B. Yang, “An offshore risk analysis method using fuzzy Bayesian network”, Journal of Offshore Mechanics and Arctic Engineering, Vol. 131, No. 4, 2009.

    Google Scholar 

  63. W. Robert and J.D. Kelly, “Containing the Threat: Protecting the Global Supply Chain through Enhanced Cargo Container Security”, The Reform Institute, reform brief, 2007.

    Google Scholar 

  64. T. Rosqvist and R. Tuominen, “Qualification of Formal Safety Assessment: an exploratory study”, Safety Science, Vol. 42, pp. 99–120, 2004.

    Google Scholar 

  65. G. Shafer, “A mathematical theory of evidence”, Princeton, N.J.: Princeton University Press, 1976.

    Google Scholar 

  66. R. Sarathy, “Security and the Global Supply Chain”, Transportation journal, Vol. 45, No. 4, pp. 28–51, 2006.

    Google Scholar 

  67. H.S. Sii, J.Wang, A.G. Eleye-Datubo, J.B. Yang and J. Liu, “Safety assessment of FPSO turretmooring system using approximate reasoning and evidential reasoning”, Journal of Marine Technology, Vol. 42, No. 2, pp. 88–102, 2005.

    Google Scholar 

  68. C.G. Soares and A.P. Teixeira, “Risk assessment in maritime transportation”, Reliability Engineering and System Safety, Vol. 74, pp. 299–309, 2001.

    Google Scholar 

  69. K. Sørby, “Relationship between security and safety in a security-safety critical system: Safety consequences of security threats”, Master thesis, Norges Teknisk-Naturvitenskapelige Universitet, Trondheim, Norway, 2003.

    Google Scholar 

  70. D. Stasinopoulos, “Maritime Security – The Need for a Global Agreement”, Maritime Economics & Logistics, Vol. 5, No. 3, pp. 311–320, 2003.

    Google Scholar 

  71. C. Tang, “Robust strategies for mitigating supply chain disruptions”, International Journal of Logistics Research and Applications, Vol. 9, No. 1, pp. 33–45, 2006.

    Google Scholar 

  72. TAPA, “Freight Suppliers Minimum Security Requirements”, Transported Asset Protection Association, 2011.

    Google Scholar 

  73. TAPA, “Freight Suppliers Minimum Trucking Security Requirements”, Transported Asset Protection Association, 2008. November 27, 2012 23:14 Atlantis Press Book - 9.75in x 6.5in book_Vitoriano-Montero Bibliography 115.

    Google Scholar 

  74. P. Tirschwell, “An opportunity for container seals,” Journal of Commerce, Feb. 7, 2005.

    Google Scholar 

  75. B. Tomlin, “On the value of mitigation and contingency strategies for managing supply chain disruption risks”, Management Science, Vol. 52, No. 5, pp. 639–57, 2006.

    Google Scholar 

  76. D.R. Towill, “The impact of business policy on bullwhip induced risk in supply chain management”, International Journal of Physical Distribution & Logistics Management, Vol. 35, No. 8, pp. 555–75, 2005.

    Google Scholar 

  77. TRANSEC, “A brief overview of the United Kingdom National Maritime Security Programme”, Department of Transport, the UK, 2011.

    Google Scholar 

  78. D. Tsamboulas, “Terrorism and the Threat to Multimodal Transport – An Overview”, in M. Bell, et al. (eds.), Security and Environmental Sustainability of Multimodal Transport, Springer: Netherlands, pp. 3–22, 2010.

    Google Scholar 

  79. S.T. Ung, “The Development of Safety and Security Assessment Techniques and their Application to Port Operations”, PhD Thesis, Liverpool John Moores University, 2007.

    Google Scholar 

  80. U.S. Congress, “Security and Accountability For Every Port Act”, Public Law, 109–347, 2006.

    Google Scholar 

  81. J. Wang, “The current status and future aspects in formal ship safety assessment”, Safety Science, Vol. 38, pp. 19–31, 2001.

    Google Scholar 

  82. J. Wang and P. Foinikis, “Formal safety assessment of containerships”, Marine Policy, Vol. 25, No. 2, pp. 143–157, 2001.

    Google Scholar 

  83. C. Wang and S. Webster, “Channel coordination for a supply chain with a risk neutral manufactures and a loss averse retailer”, Decision Sciences, Vol. 38, No. 3, pp. 361–89, 2007.

    Google Scholar 

  84. WCO, “SAFE Framework of Standards”, World Customs Organization, 2007.

    Google Scholar 

  85. H.H. Willis and D.S. Ortiz, “Evaluating The Security Of The Global Containerized Supply Chain”, RAND Technical Report Series, TR-214-RC, 2004.

    Google Scholar 

  86. M. Wilson, “The impact of transportation disruptions on supply chain performance”, Transportation Research, Part E, Vol. 43, No. 4, pp. 295–320, 2007.

    Google Scholar 

  87. K.J. Wydajewski and B.L. White, “Processes and techniques for providing critical data to first responders to maritime security incidents”, Oceans 2002 IEEE/MTS Conference Proceedings, Vol. 2, Mississippi, U.S., pp. 1180–1190, 2002.

    Google Scholar 

  88. Y.C. Yang, “Risk management of Taiwan’s maritime supply chain security”, Safety Science, Vol. 49, pp. 382–393, 2011.

    Google Scholar 

  89. Z.L. Yang, “Risk Assessment and Decision Making of Container Supply Chains”, PhD Thesis, Liverpool John Moores University, 2006.

    Google Scholar 

  90. J. B. Yang, J. Liu, J.Wang, H. S. Sii and H.W.Wang, “A belief rule-base inference methodology using the evidential reasoning approach – RIMER”, IEEE Transactions on Systems, Man, and Cybernetics – Part A, Vol. 36, No. 2, pp. 266–285, 2006.

    Google Scholar 

  91. J.B. Yang and M.G. Singh, “An evidential reasoning approach for multiple attribute decision making with uncertainty”, IEEE Transactions on Systems, Man, and Cybernetics, Vol. 24, No. 1, pp. 1–18, 1994.

    Google Scholar 

  92. J.B. Yang and D.L. Xu, “On the evidential reasoning algorithm for multi-attribute decision analysis under uncertainty”, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans, Vol. 32, No. 3, pp. 289–304, 2002.

    Google Scholar 

  93. W.J. Yoon, S.H. Chung, S.J. Lee and Y.S. Moon, “Design and Implementation of an Active RFID System for Fast Tag Collection,” 7th IEEE International Conference on Computer and Information Technology, Fukushima Prefecture, Japan, pp. 961–966, 2007.

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dawei Tang .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Atlantis Press

About this chapter

Cite this chapter

Tang, D., Xu, DL., Yang, JB., Chen, Yw. (2013). Security Based Operation in Container Line Supply Chain: a Literature Review. In: Vitoriano, B., Montero, J., Ruan, D. (eds) Decision Aid Models for Disaster Management and Emergencies. Atlantis Computational Intelligence Systems, vol 7. Atlantis Press, Paris. https://doi.org/10.2991/978-94-91216-74-9_5

Download citation

  • DOI: https://doi.org/10.2991/978-94-91216-74-9_5

  • Published:

  • Publisher Name: Atlantis Press, Paris

  • Print ISBN: 978-94-91216-73-2

  • Online ISBN: 978-94-91216-74-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Societies and partnerships