Advertisement

Risk Management of Critical Logistical Infrastructures: Securing the Basis for Effective and Efficient Supply Chains

  • Michael HuthEmail author
  • Sascha Düerkop
Chapter
Part of the Springer Series in Supply Chain Management book series (SSSCM, volume 7)

Abstract

To establish both effective and efficient supply chains, not only planning, controlling, and monitoring of material, information, and financial flows are necessary, but also the logistical infrastructure must be available and in an appropriate condition for all required processes. However, in the recent past, various events led to a limitation—or even to a breakdown—of the logistical infrastructure. These often unanticipated events—ranging from natural catastrophes such as an earthquake, to political crises such as in Eastern Ukraine, to terror attacks—might have a tremendous impact on supply chains. However, in supply chain risk management, the explicit consideration of risks for the logistical infrastructure is often ignored. We therefore focus on the critical logistical infrastructure and develop an evaluation approach for decision makers to support them in channeling risk management activities. The evaluation considers how the limitation or breakdown of any element of the logistical network influences all supply chains that use the network. By calculating risk-induced costs for the supply chains, implications of risk can be quantified and used as a basis for decision making.

References

  1. Abarez (2016). Artsakh determined to open Stepenakert airport for ‘people’s right to free movement, http://asbarez.com/141373/artsakh-determined-to-open-stepanakert-airport-for-peoples-right-to-free-movement/.
  2. Adar, E., & Wuchner, A. (2005). Risk management for critical infrastructure protection (CIP) challenges, best practices & tools. In First IEEE International Workshop on Critical Infrastructure Protection.Google Scholar
  3. Alderson, D. L., Brown, G. G., Carlyle, W. M., & Wood, R. K. (2011). Solving defender-attacker-defender models for infrastructure defense. In K. Wood & R. Dell (Eds.), Operations research, computing and homeland defense (pp. 28–49). Hannover, MD: Institute for Operations Research and the Management Sciences.Google Scholar
  4. Avritzer, A., Di Giandomenico, F., Remke, A., & Riedl, M. (2012). Assessing dependability and resilience in critical infrastructures: challenges and opportunities. In K. Walter, A. Avritzer, M. Vieira & A. V. Moorsel (Eds.), Resilience assessment and evaluation of computing systems (pp. 41–63). Berlin, Heidelberg: Springer.CrossRefGoogle Scholar
  5. Ball, M. O., Golden, B. L., & Vohra, R. V. (1989). Finding the Most vital arcs in a network. Operations Research Letters, 8(2), 73–76.CrossRefGoogle Scholar
  6. Boin, A., & McConnell, A. (2007). Preparing for critical infrastructure breakdowns: the limits of crisis management and the need for resilience. Journal of Contingencies and Crisis Management, 15(1), 50–59.CrossRefGoogle Scholar
  7. Breakbulk (2016). G20 Summit impacts Hangzhou logistics. http://www.breakbulk.com/g20-summit-impacts-hangzhou-logistics/.
  8. Brown, G. G., Carlyle, W. M., Salmeron, J., & Wood, K. (2005). Analyzing the vulnerability of critical infrastructure to attack and planning defenses. In H. Greenberg & J. Smith (Eds.), INFORMS tutorials in operations research (pp. 102–123). Hannover, MD: Institute for Operations Research and the Management Sciences.Google Scholar
  9. Brown, G. G., Carlyle, W. M., Salmerón, J., & Wood, K. (2006). Defending critical infrastructure. Interfaces, 36(6), 530–544.CrossRefGoogle Scholar
  10. Bumgarner, J., & Borg, S. (2009). Overview by the US-CCU of the Cyber campaign against Georgia in August of 2008. US-CCU Special Report.Google Scholar
  11. Cardona, O. D. (2004). The need for rethinking the concepts of vulnerability and risk from a holistic perspective: A necessary review and criticism for effective risk management. In G. Bankoff, G. Frerks, & D. Hilhorst (Eds.), Mapping vulnerability: Disasters, development and people (p. 17). London: Earthscan.Google Scholar
  12. Church, R. L., & Scaparra, M. P. (2006). Protecting critical assets: The r-interdiction median problem with fortification. Geographical Analysis., 39(2), 129–146.CrossRefGoogle Scholar
  13. CNN (2003). Ohio trucker joined al Qaeda Jihad. http://edition.cnn.com/2003/LAW/06/19/alqaeda.plea/.
  14. Collier, S., & Lakoff, A. (2008). The vulnerability of vital systems: How ‘critical infrastructure’ became a security problem. In: M. Dunn & K. Soby (Eds.), Securing the homeland: Critical infrastructure, risk and security (pp. 40–62). London: Routledge.Google Scholar
  15. Corley, H. W., & Chang, H. (1974). Finding the n most vital nodes in a flow network. Management Science, 21(3), 362–364.CrossRefGoogle Scholar
  16. Corley, H. W., & Sha, D. Y. (1982). Most vital links and nodes in weighted networks. Operations Research Letters, 1(4), 157–160.CrossRefGoogle Scholar
  17. DB Schenker China (2015). Explosions in industrial area in Tianjin impacts port operations. http://www.dbschenker.com.cn/log-cn-en/news_media/news/9842348/explosion_in_tianjin.html.
  18. Fulkerson, D. R., & Harding, G. C. (1977). Maximizing the minimum source-sink path subject to a budget constraint. Mathematical Programming, 13(1), 116–118.CrossRefGoogle Scholar
  19. Godfrey, P. C., Merrill, C. B., & Hansen, J. M. (2009). The relationship between corporate social responsibility and shareholder value: An empirical test of the risk management hypothesis. Strategic Management Journal, 30(4), 425–445.CrossRefGoogle Scholar
  20. Golden, B. (1977). A problem in network interdiction. Naval Research Logistics Quarterly, 25(4), 711–713.CrossRefGoogle Scholar
  21. Guyer, R. L. (2011). Radioactivity and rights—clashes at bikini atoll. American Journal of Public Health, 91(9), 1371–1376.CrossRefGoogle Scholar
  22. Harris, T. E., & Ross, F. S. (1955). Fundamentals of a method for evaluating rail net capacities (No. RM-1573). Santa Monica, USA: RAND CORP.Google Scholar
  23. Herzog, S. (2011). Revisiting the Estonian cyber attacks: Digital threats and multinational responses. Journal of Strategic Security, 4(2).CrossRefGoogle Scholar
  24. Heusch, P. (2016). Streik und Straßenblockaden legen Teile des Landes lahm. http://www.swp.de/ulm/nachrichten/politik/streik-und-strassenblockaden-legen-teile-des-landes-lahm-13020619.html.
  25. Holzmann, R., & Jørgensen, S. (2001). Social risk management: A new conceptual framework for social protection, and beyond. International Tax and Public Finance., 8(4), 529–556.CrossRefGoogle Scholar
  26. Holzmann, R., Sherburne-Benz, L., & Tesliuc, E. (2003). Social risk management: The World Bank’s approach to social protection in a globalizing world. Washington DC, USA: World Bank.Google Scholar
  27. Jackson, C. M. (2013). Estonian cyber policy after the 2007 attacks: Drivers of change and factors for success. New Voices in Public Policy, 7(1).Google Scholar
  28. Lubore, S. H., Ratliff, H. D., & Sicilia, G. T. (1971). Determining the most vital link in a flow network. Naval Research Logistics Quarterly, 18(4), 497–502.CrossRefGoogle Scholar
  29. Malik, K., Mittal, A. K., & Gupta, S. K. (1989). The k most vital arcs in the shortest path problem. Operations Research Letters, 8(4), 223–227.CrossRefGoogle Scholar
  30. McKenzie, S. (2016). Brussels travel: Flights suspended, transit limited. http://edition.cnn.com/2016/03/22/europe/brussels-explosions-transport-flights-metro-suspended/.
  31. McMasters, A. W., & Mastin, T. M. (1970). Optimal interdiction of a supply network. Naval Research Logistics Quarterly, 17(3), 261–268.CrossRefGoogle Scholar
  32. Morley, N. (2013). Bold plan to regenerate derelict Nicosia airport. http://cyprus-mail.com/2013/09/22/bold-plan-to-regenerate-derelict-nicosia-airport/.
  33. Page, P. (2015). Nepal earthquake response challenges logistics experts. http://www.wsj.com/articles/nepal-earthquake-response-challenges-logistics-experts-1430343036.
  34. Penn, A. B. (2010). The Virgin Islands climate change green paper. Conservation and Fisheries Department and Ministry of Natural Resources and Labour.Google Scholar
  35. President’s Commission on Critical Infrastructure Protection (1997). Critical Foundations—Protecting America’s Infrastructures. https://fas.org/sgp/library/pccip.pdf.
  36. Randelhoff, M. (2010). Eyjafjallajökull—Die Auswirkungen in Europa und der ganzen Welt. http://www.zukunft-mobilitaet.net/849/analyse/eyjafjallajoekull-fazit-schaden-flugverkehr-global/.
  37. Ratliff, D. H., Sicilia, G. T., & Lubore, S. H. (1975). Finding the n most vital links in flow networks. Management Science, 21(5), 531–539.CrossRefGoogle Scholar
  38. Rinaldi, S. M., Peerenboom, J. P., & Kelly, T. K. (2001). Identifying, understanding, and analyzing critical infrastructure interdependencies. IEEE Control Systems, 21(6), 11–25.CrossRefGoogle Scholar
  39. Salmerón, J., Wood, K., & Baldick, R. (2004). Analysis of electric grid security under terrorist threat. IEEE Transactions on Power Systems, 19(2), 905–912.CrossRefGoogle Scholar
  40. Salmerón, J., Wood, K., & Baldick, R. (2009). Worst-case interdiction analysis of large-scale electric power grids. IEEE Transactions on Power Systems, 24(1), 96–104.CrossRefGoogle Scholar
  41. Sapori, E., Sciutto, M., & Sciutto, G. (2014). A quantitative approach to risk management in critical infrastructures. Transportation Research Procedia, 3, 740–749.CrossRefGoogle Scholar
  42. Scaparra, M. P., & Church, R. L. (2008). A bilevel mixed-integer program for critical infrastructure protection planning. Computers & Operations Research, 35(6), 1905–1923.CrossRefGoogle Scholar
  43. Schrijver, A. (2002). Combinatorial optimization: Polyhedra and efficiency (24th ed.) (pp. 166–169). Heidelberg: Springer Science & Business Media.Google Scholar
  44. Sottilotta, C. E. (2013). Political risk: Concepts, definitions. Challenge. Working Paper Series. LUISS School of Government.Google Scholar
  45. Stock, J. (2017). United Nations Security Council open debate on the protection of critical infrastructure against terrorist attacks. Statement by Interpol. https://www.interpol.int/content/download/34261/450506/version/1/file/Statement%20by%20Secretary%20General%20to%20the%20UNSC.pdf.
  46. Turner, C. (2015). Eurotunnel warns of lengthy delays due to ‘migrant activity’. http://www.telegraph.co.uk/news/uknews/11762469/Eurotunnel-suspends-passenger-services-because-of-migrant-activity-in-Calais.html.
  47. Ukraine Today (2015). Cyborgs vs. Kremlin. http://cyborgs.uatoday.tv/.
  48. US PIRG Education Fund (2009). Private roads, public costs. http://www.uspirg.org/sites/pirg/files/reports/Private-Roads-Public-Costs-Updated_1.pdf.
  49. Uysal, O. (2014). 10 things to know about baku-Tbilisi-Kars Railway Project. https://railturkey.org/2014/10/20/baku-tblisi-kars-railway/.
  50. Wollmer, R. D. (1963). Some methods for determining the most vital link in a railway network. RAND Memorandum, RM-3321-ISA.Google Scholar
  51. Wollmer, R. D. (1964). Removing arcs from a network. Operations Research, 12(6), 934–940.CrossRefGoogle Scholar
  52. Wollmer, R. D. (1968). Stochastic sensitivity analysis of maximum flow and shortest route networks. Management Science, 14(9), 551–564.CrossRefGoogle Scholar
  53. Wood, R. K. (1993). Deterministic network interdiction. Mathematical and Computer Modelling, 17(2), 1–18.CrossRefGoogle Scholar
  54. Zaman, A. (2016). U.S. air strikes destroy last Euphrates bridges in Deir Ez Zor. https://en.zamanalwsl.net/news/18649.html.

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  1. 1.Department of BusinessFulda University of Applied SciencesFuldaGermany

Personalised recommendations