Integrity of Supply Chain Visibility: Linking Information to the Physical World

  • Joris Hulstijn
  • Sietse Overbeek
  • Huib Aldewereld
  • Rob Christiaanse
Part of the Lecture Notes in Business Information Processing book series (LNBIP, volume 112)


Regulatory compliance in international trade can be enhanced by facilitating electronic exchange of trade documents to increase the supply chain visibility. Crucial for acceptance of the supply chain visibility concept is trust in the reliability of the data. This depends on both the integrity of information (no data is altered illicitly) and integrity of the flow of goods (no goods are unknowingly added or taken away). The challenge is to determine how these concepts of integrity are interconnected. In this paper, we discuss control measures to ensure integrity of supply chain information and the related goods flow. Such controls consist of three components. First, only trusted traders take part. Second, technical control measures ensure internal consistency of the information system, i.e., the system maintains integrity constraints based on a model of the transactions taking place. Third, physical and organizational control measures mitigate the risk that events in the real world do not correspond to the reported transactions. The usefulness and adequacy of the approach is illustrated with two case studies: the use of electronic seals in the Smart-CM project, and the use of biometrics for authentication in the E-Link project at Schiphol Airport, the Netherlands.


integrity supply chain visibility virtual data pipeline 


  1. 1.
    Aldewereld, H.: Autonomy vs. Conformity - An Institutional Perspective on Norms and Protocols. Ph.D. thesis. Universiteit Utrecht (2007)Google Scholar
  2. 2.
    Blokdijk, J., Drieënhuizen, F., Wallage, P.: Reflections on Auditing Theory, A contribution from the Netherlands. Limperg Institute Amsterdam (1995)Google Scholar
  3. 3.
    Boritz, J.: Is practitioners’ views on core concepts of information integrity. International Journal of Accounting Information Systems 6(4), 260–279 (2005)CrossRefGoogle Scholar
  4. 4.
    Chen, S., Drake, J., Tsai, W.: Database requirements for a software engineering environment: criteria and empirical evaluation. Information and Software Technology 35(3), 149–161 (1993)CrossRefGoogle Scholar
  5. 5.
    Clark, D., Wilson, D.: A comparison of commercial and military computer security policies. In: IEEE Symposium on Security and Privacy, pp. 184–194 (1987)Google Scholar
  6. 6.
    European Commission: AEO guidelines. Tech. Rep. TAXUD/2006/1450, Directorate-General Taxation and Customs Union (2007)Google Scholar
  7. 7.
    Dietz, J.L.: The deep structure of business processes. Communications of the ACM 49(5), 59–64 (2006)CrossRefGoogle Scholar
  8. 8.
    FIPS: Minimum security requirements for federal information and information systems. Tech. rep., U.S. National Institute of Standards in Technology, NIST (2006)Google Scholar
  9. 9.
    Ghaeb, J., Chebil, J.: An oblique-matrix technique for data integrity assurance. Computers & Security 28(1-2), 94–99 (2009)CrossRefGoogle Scholar
  10. 10.
    Governatori, G., Sadiq, S.: The journey to business process compliance, pp. 426–445. IGI Global (2009)Google Scholar
  11. 11.
    Grefen, P., Apers, P.: Integrity control in relational database systems - an overview. Data and Knowledge Engineering 10(2), 187–223 (1993)CrossRefGoogle Scholar
  12. 12.
    Grossi, D.: Designing Invisible Handcuffs: Formal Investigations in Institutions and Organizations for Multi-agent Systems. Ph.D. thesis. Universiteit Utrecht (2007)Google Scholar
  13. 13.
    Hesketh, D.: Weaknesses in the supply chain: who packed the box? World Customs Journal 4(2), 3–20 (2010)Google Scholar
  14. 14.
    Hofman, W.: Supply chain risk analysis with linked open data. In: Vermaas, P.E., Dignum, V. (eds.) FOMI 2011, pp. 77–87. IOS Press, Amsterdam (2011)Google Scholar
  15. 15.
    INTEGRITY, SMART-CM: Global container supply chain compendium (2008)Google Scholar
  16. 16.
    Klein, R., Rai, A.: Interfirm strategic information flows in logistics supply chain relationships. MIS Quarterly 33(4), 735–762 (2009)Google Scholar
  17. 17.
    Müller, A.: Re-engineering Security: A risk based approach for information security focused business process re-design. Master’s thesis. Erasmus Universiteit (2012)Google Scholar
  18. 18.
    Rizzo, F., Barboni, M., Faggion, L., Azzalin, G., Sironi, M.: Improved security for commercial container transports using an innovative active RFID system. Journal of Network and Computer Applications 34(3), 846–852 (2011)CrossRefGoogle Scholar
  19. 19.
    Searle, J.R.: The Construction of Social Reality. The Free Press (1995)Google Scholar
  20. 20.
    Starreveld, R.W., de Mare, B., Joels, E.: Bestuurlijke Informatieverzorging, vol. 1. Samsom, Alphen aan den Rijn (1994) (in Dutch)Google Scholar
  21. 21.
    Tan, Y., Bjørn-Andersen, N., Klein, S., Rukanova, B. (eds.): Accelerating Global Supply Chains with IT-Innovation. Springer, Berlin (2011)Google Scholar
  22. 22.
    Vasarhelyi, M.A., Alles, M., Kogan, A.: Principles of analytic monitoring for continuous assurance. J. of Emerging Technologies in Accounting 1(1), 1–21 (2004)CrossRefGoogle Scholar
  23. 23.
    WCO: SAFE framework of standards to secure and facilitate global trade (2011)Google Scholar
  24. 24.
    Weigand, H., de Moor, A.: Workflow analysis with communication norms. Data and Knowledge Engineering 47(3), 349–369 (2003)CrossRefGoogle Scholar
  25. 25.
    Yu, L.: Linked open data. In: A Developer’s Guide to the Semantic Web, pp. 409–466. Springer, Heidelberg (2011)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  • Joris Hulstijn
    • 1
  • Sietse Overbeek
    • 1
  • Huib Aldewereld
    • 1
  • Rob Christiaanse
    • 2
  1. 1.Faculty of Technology, Policy and ManagementDelft University of TechnologyDelftThe Netherlands
  2. 2.VU University Amsterdam and EFCO SolutionsAmsterdamThe Netherlands

Personalised recommendations