Abstract
Supply chain disruptions may derive from various sources but the antagonistic threats are centered in supply chain disruption. Antagonistic threats are dynamic due to the spiral input, processes and feedbacks which create a very complex situation to analyze, assess and making decision. Beside risks, vulnerability derived from supply chain characteristics is the other issue which should be measured. Antagonistic threats are magnified in such vulnerable supply chains. After 9/11, 2001, the Security and Efficiency of the global supply chain has become an important issue in global transportation. This leads firms to consider Supply chain security as part and parcel of a company’s comprehensive risk-management program. In a security business, it is essential to understand different type risks and evaluate transportation assets, do risk based prioritization, and protect customers through cost effective actions. This could be occurred corresponding to risk management methods. Providing security may occur internally by firms or they outsource it to security providers which could be performed in higher quality or more cost effectively. In this article, we focus on managing the risks and securing the supply chain business with the security theory and strategies in the supply chain and transportation network. In order to discover risks throughout the supply chain, security provider needs to find risk hot spots where the likelihood of risk is higher. We propose two approaches (geographical and elements/process) to seek probable risks. The next step is to take strategies for risk prevention and risk mitigation. Consequently, we connect the security strategies from the literature review and collected information from security business to suggest a suitable model of how to handle the risks and achieve security in a systemic and scientific way.
Similar content being viewed by others
References
Adams B (2010) Supply chain risk and security - A focus on trends and solutions for the US-Canada Marketplace-Webinar Presentation
Borodzicz EP (2005) Risk, crisis and security management. John Wiley & Sons, Chichester
Brindley C, Ritchie B (2004) Introduction. In: Brindley C (ed) Supply chain risk. Ashgate Publishing Company, p 205
Burke RJ (2005) International terrorism and threats to security, implications for organizations and management. Disaster Prev Manag 14(5)
Christopher M, Lee H (2004) Mitigating supply chain risk through improved confidence. Int J Phys Distrib Logist Manag 34(5):388–396
Christopher M, Peck H (2004) Building the resilient supply chain. Int J Logist Manag 15(2)
Closs DJ, Mcgarrell EF (2004) Enhancing security throughout the supply chain. IBM Center for The Business of Government, Chicago
Closs D, Speier C, Whipple J, VOSS DM (2008) A framework for protecting your supply chain. Supply Chain Manag Rev 12(2):38–45
Colbert JL (1991) Understanding the relationship between business risk and inherent risk. Manag Audit J 6(3):4–7
CSCMP. Supply Chain Management Definition. [online]. [Accessed 10 June 2010]. Available from World Wide Web: <HYPERLINK “http://cscmp.org/aboutcscmp/definitions.asp” http://cscmp.org/aboutcscmp/definitions.asp>
DOFF R (2008) Defining and measuring business risk in an economic-capital framework. J Risk Finance 9(4):317–333
Ekwall D (2009) Managing the risk for antagonistic threats against the transport network, doctoral dissertation. Göteborg: Chalmers Universty of Technology
Ekwall D (2010) On analyzing the official statistics for antagonistic threats against transports in EU: a supply chain risk perspective. J Transp Secur 3(4):213–230
European Commission (2009) A sustainable future for transport: towards an integrated, technology-led and userfriendly system (COM(2009) 279 (final) of 17 June 2009). Publications Office of the European Union, Luxemburge
Geunes J, Taffe K (2008) Transportation system overview. In: Don Taylor G (ed) Logistics engineering handbook. CRC Press, Boca Raton, p 14
Gutierrez X, Hintsa J (2006) Voluntary supply chain security programs: a systematic comparison. In: ILS 2006, The International Conference on information systems, logistics and supply chain. Lyon, France
Helliar C, Lonie A, Power D, Sinclair D (2001) Attitudes of UK managers to risk and uncertainty. Balance Sheet 9(4):7–10
Husdal J (2008) Robustness, flexibility and resilience in the supply chain. [online]. [Accessed 20 July 2010]. Available from World Wide Web: <HYPERLINK “http://www.husdal.com/2008/04/28/robustness-flexibility-and-resilience-in-the-supply-chain/” http://www.husdal.com/2008/04/28/robustness-flexibility-and-resilience-in-the-supply-chain/>
Hussey J, Hussey R (1997) Business research: a practical guide for undergraduate and postgraduate students. Palgrave Macmillan
Juttner U (2005) Supply chain risk management: understanding the business requirements from a practitioner perspective. Int J Logist Manag 16(1):120–141
Jüttner U, Peck H, Christopher M (2003) Supply chain risk management: outlining an agenda for future research. Int J Logist Res Appl 6(4):197–210
Lalwani CS, Disney SM, Naim MM (2006) On assessing the sensitivity to uncertainty in distribution network design. Int J Phys Distrib Logist Manag 36(1):5–21
Lee HL, Whang S (2005) Higher supply chain security with lower cost: lessons from total quality management. Int J Prod Econ 96(3):289–300
Lumsden K (2009) Economy of transportation systems. Chalmers University of Technology, Göteborg
metoffice.gov.uk (2010) [online]. [Accessed 25 Jul 2010]. Available from World Wide Web: <HYPERLINK “http://www.metoffice.gov.uk/corporate/pressoffice/2010/volcano.html” http://www.metoffice.gov.uk/corporate/pressoffice/2010/volcano.html>
Pettit TJ, Fiksel J, Croxton KL (2010) Ensuring supply chain resilience: development of a conceptual framework. J Bus Logist 31(1):1–21
Popper K (1959) The logic of scientific discovery. Routledge, London
Rice JB Jr, Spayd PW (2005) “Investing in supply chain security: collateral benefits”, Special Report Series, IBM Center for The Business of Government, available at: http://www.ibm.com
Rowe WD (1977) An anatomy of risk (Wiley series on systems engineering & analysis). John Wiley & Sons Inc, New York
Sarathy R (2006) Security and the global supply chain. Transp J 28-51
Sheffi Y (2005) The resilient enterprise: overcoming vulnerability for competitive advantage. MIT Press, London
Sutherland JL (2008) Logistics from a historical perspective. In: Don Taylor G (ed) Logistics engineering handbook. CRC Press, Boca Raton, p 1
Svensson G (2002) A conceptual framework of vulnerability in firms’ inbound and outbound logistics flows. Int J Phys Distrib Logist Manag 32(2):110–134
Tang CS (2006) Robust strategies for mitigating supply chain disruptions. Int J Logist Res Appl 9(1):33–45
TAPA (2010) Quarterly bulletin Q1 2010
The Local.se. 2009. [online]. [Accessed 25 Jul 2010]. Available from World Wide Web: <HYPERLINK “http://www.thelocal.se/22234/20090923/” http://www.thelocal.se/22234/20090923/>
University of Cranfield 2002. Supply chain vulnerbility
Waters D (2007) Supply chain risk management - vulnerability and resilience in logistics. Kogan Page, London
Williams Z, Lueg JE, Lemay SA (2008) Supply chain security: an overview and research agenda. Int J Logist Manag 19(2):254–281
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhang, D., Dadkhah, P. & Ekwall, D. How robustness and resilience support security business against antagonistic threats in transport network. J Transp Secur 4, 201–219 (2011). https://doi.org/10.1007/s12198-011-0067-2
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12198-011-0067-2