Developing Support Tools for Compliance in Supply Chains

  • Melissa Robles
  • Juan Diego Serrano
  • Maria Laura Maragunic
  • Bernd Noche
Part of the Lecture Notes in Logistics book series (LNLO)


Decisions about the planning, organization, execution and control of supply chains are to a vast extent based on economic, efficiency and time factors. Multiple methods and tools have been developed to support supply chain managers in this task. With new expectations and demands from society and governments regarding security and trade compliance, the complexity of managing value chains, especially international ones, has increased, and responsible operations are needed at all company levels. This imposes, among others, new challenges when designing networks and selecting partners or serving customers. To cope with these new demands, tools should be developed to support supply chain managers to ensure more secure and compliant operations. In this chapter, a prototype tool for meeting compliance requirements and increasing security in supply chains is presented.


Compliance Supply chain security Sanction lists Levenshtein 


  1. Andrukonis T (2009) Elements of an effective export compliance program. In: Bureau of industry and security U.S. department of commerce. Available via BIS. Accessed 15 Jan 2014
  2. Autry CW, Bobbitt LM (2008) Supply chain security orientation: conceptual development and a proposed framework. Int J Logistics Manage 19(1):42–64. doi: 10.1108/09574090810872596 CrossRefGoogle Scholar
  3. Closs DJ, McGarrell EF (2004) Enhancing security throughout the supply chain. Special report to the IBM Center for the Business of Government, Washington, DCGoogle Scholar
  4. Cook T (2011) Compliance in today’s global supply chain. Taylor & Francis Group, FloridaGoogle Scholar
  5. Ekwall D (2012) Supply chain security—threats and solutions. In: Banaitiene N (ed) Risk management—current issues and challenges, InTech, pp 157–175. doi: 10.5772/48365
  6. Frez J, Baloian N, Zurita G et al (2014) Dealing with incomplete and uncertain context data in geographic information systems. In: Proceedings of the 2014 IEEE 18th international conference on computer supported cooperative work in design, National Tsing Hua University, Hsinchu, 21–23 May 2014Google Scholar
  7. Helferich OK, Cook RL (2003) Securing the supply chain. Council of Logistics Management, ChicagoGoogle Scholar
  8. Hintsa J, Gutierrez X, Wieser P et al (2009) Supply chain security management: an overview. Int J Logistics Syst Manage 3–4(2009):344–355. doi: 10.1504/IJLSM.2009.022501 CrossRefGoogle Scholar
  9. Hintsa J, Hameri AP (2009) Security programs as part of efficient supply chain management. Supply Chain Forum Int J 10(2):26–37Google Scholar
  10. Irowec M, Rittscher J, Dittrich M et al (2013) Report evaluation OrGoLo. To be publishedGoogle Scholar
  11. Jüttner U (2005) Supply chain risk management: understanding the business requirements from a practitioner perspective. Int J Logistics Manage 16(1):120–141. doi: 10.1108/09574090510617385 CrossRefGoogle Scholar
  12. Kidston H, Piro K (2014) Allianz risk barometer: Geschäftsrisiken 2014. In: Allianz risk barometer 2014: Zunehmende Verzahnung von Risiken ist Herausforderung für Unternehmen. Allianz. Available via Allianz. Accessed 15 Jan 2014
  13. Megede E (2010) Aufgaben von Compliance – ein Überblick. Presentation at the Deutsch-Nordischen Juristenvereinigung e.V., Augsburg, 1 Oct 2010Google Scholar
  14. Ritter LJ, Barrett M, Wilson R (2007) Securing global transportation networks: a total security management approach. McGraw-Hill, New YorkGoogle Scholar
  15. Robles M, Wei F, Noche B (2013) Challenges in the planning, organization, execution and control of international supply chains. In: Clausen U, Ten Hompel M, Klumpp M (eds) Efficiency and logistics—lecture notes in logistics, pp 245–252. doi: 10.1007/978-3-642-32838-1_26
  16. Sheffi Y (2001) Supply chain management under the threat of international terrorism. Int J Logistics Manage 12(2):1–11. doi: 10.1108/09574090110806262 CrossRefMathSciNetGoogle Scholar
  17. Williams Z, Lueg JE, LeMay SA (2008) Supply chain security: an overview and research agenda. Int J Logistics Manage 19(2):254–281. doi: 10.1108/09574090810895988
  18. Yang CC, Wei HH (2013) The effect of supply chain security management on security performance in container shipping operations. Supply Chain Manage Int J 18(1):74–85. doi: 10.1108/13598541311293195 CrossRefGoogle Scholar
  19. Zsidisin GA, Melnyk SA, Ragatz GL (2005) An institutional theory perspective of business continuity planning for purchasing and supply management. Int J Prod Res 43(16):3401–3420. doi: 10.1080/00207540500095613 CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2016

Authors and Affiliations

  • Melissa Robles
    • 1
  • Juan Diego Serrano
    • 1
  • Maria Laura Maragunic
    • 1
  • Bernd Noche
    • 1
  1. 1.Department of Transport Systems and LogisticsUniversity of Duisburg-EssenDuisburgGermany

Personalised recommendations