Abstract
Regulatory compliance in international trade can be enhanced by facilitating electronic exchange of trade documents to increase the supply chain visibility. Crucial for acceptance of the supply chain visibility concept is trust in the reliability of the data. This depends on both the integrity of information (no data is altered illicitly) and integrity of the flow of goods (no goods are unknowingly added or taken away). The challenge is to determine how these concepts of integrity are interconnected. In this paper, we discuss control measures to ensure integrity of supply chain information and the related goods flow. Such controls consist of three components. First, only trusted traders take part. Second, technical control measures ensure internal consistency of the information system, i.e., the system maintains integrity constraints based on a model of the transactions taking place. Third, physical and organizational control measures mitigate the risk that events in the real world do not correspond to the reported transactions. The usefulness and adequacy of the approach is illustrated with two case studies: the use of electronic seals in the Smart-CM project, and the use of biometrics for authentication in the E-Link project at Schiphol Airport, the Netherlands.
Keywords
References
Aldewereld, H.: Autonomy vs. Conformity - An Institutional Perspective on Norms and Protocols. Ph.D. thesis. Universiteit Utrecht (2007)
Blokdijk, J., Drieënhuizen, F., Wallage, P.: Reflections on Auditing Theory, A contribution from the Netherlands. Limperg Institute Amsterdam (1995)
Boritz, J.: Is practitioners’ views on core concepts of information integrity. International Journal of Accounting Information Systems 6(4), 260–279 (2005)
Chen, S., Drake, J., Tsai, W.: Database requirements for a software engineering environment: criteria and empirical evaluation. Information and Software Technology 35(3), 149–161 (1993)
Clark, D., Wilson, D.: A comparison of commercial and military computer security policies. In: IEEE Symposium on Security and Privacy, pp. 184–194 (1987)
European Commission: AEO guidelines. Tech. Rep. TAXUD/2006/1450, Directorate-General Taxation and Customs Union (2007)
Dietz, J.L.: The deep structure of business processes. Communications of the ACM 49(5), 59–64 (2006)
FIPS: Minimum security requirements for federal information and information systems. Tech. rep., U.S. National Institute of Standards in Technology, NIST (2006)
Ghaeb, J., Chebil, J.: An oblique-matrix technique for data integrity assurance. Computers & Security 28(1-2), 94–99 (2009)
Governatori, G., Sadiq, S.: The journey to business process compliance, pp. 426–445. IGI Global (2009)
Grefen, P., Apers, P.: Integrity control in relational database systems - an overview. Data and Knowledge Engineering 10(2), 187–223 (1993)
Grossi, D.: Designing Invisible Handcuffs: Formal Investigations in Institutions and Organizations for Multi-agent Systems. Ph.D. thesis. Universiteit Utrecht (2007)
Hesketh, D.: Weaknesses in the supply chain: who packed the box? World Customs Journal 4(2), 3–20 (2010)
Hofman, W.: Supply chain risk analysis with linked open data. In: Vermaas, P.E., Dignum, V. (eds.) FOMI 2011, pp. 77–87. IOS Press, Amsterdam (2011)
INTEGRITY, SMART-CM: Global container supply chain compendium (2008)
Klein, R., Rai, A.: Interfirm strategic information flows in logistics supply chain relationships. MIS Quarterly 33(4), 735–762 (2009)
Müller, A.: Re-engineering Security: A risk based approach for information security focused business process re-design. Master’s thesis. Erasmus Universiteit (2012)
Rizzo, F., Barboni, M., Faggion, L., Azzalin, G., Sironi, M.: Improved security for commercial container transports using an innovative active RFID system. Journal of Network and Computer Applications 34(3), 846–852 (2011)
Searle, J.R.: The Construction of Social Reality. The Free Press (1995)
Starreveld, R.W., de Mare, B., Joels, E.: Bestuurlijke Informatieverzorging, vol. 1. Samsom, Alphen aan den Rijn (1994) (in Dutch)
Tan, Y., Bjørn-Andersen, N., Klein, S., Rukanova, B. (eds.): Accelerating Global Supply Chains with IT-Innovation. Springer, Berlin (2011)
Vasarhelyi, M.A., Alles, M., Kogan, A.: Principles of analytic monitoring for continuous assurance. J. of Emerging Technologies in Accounting 1(1), 1–21 (2004)
WCO: SAFE framework of standards to secure and facilitate global trade (2011)
Weigand, H., de Moor, A.: Workflow analysis with communication norms. Data and Knowledge Engineering 47(3), 349–369 (2003)
Yu, L.: Linked open data. In: A Developer’s Guide to the Semantic Web, pp. 409–466. Springer, Heidelberg (2011)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Hulstijn, J., Overbeek, S., Aldewereld, H., Christiaanse, R. (2012). Integrity of Supply Chain Visibility: Linking Information to the Physical World. In: Bajec, M., Eder, J. (eds) Advanced Information Systems Engineering Workshops. CAiSE 2012. Lecture Notes in Business Information Processing, vol 112. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-31069-0_29
Download citation
DOI: https://doi.org/10.1007/978-3-642-31069-0_29
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-31068-3
Online ISBN: 978-3-642-31069-0
eBook Packages: Computer ScienceComputer Science (R0)