Abstract
This paper focuses on the re-engineering of supply chain security processes of an international organization with global operations. This research project is based on a multimethod field study designed to evaluate, over a 12 month period, the implementation of a new security concept downstream of the central warehouse. During a 12 month field study, it was found that after new processes were in place, the organization was able to achieve substantial benefits, including increased velocity, enhanced security, and lower security costs. This research introduces the new concept of security at the source, which defines security as a fundamental criterion of quality; it borrows from quality management theory to implement a new perspective on supply chain security; and it offers a new avenue for researchers to further study this concept as a cost-effective solution to secure supply chains. The results of this research outline new processes for industries requiring enhanced security in their shipments due to the vulnerability of high-profile targets, such as high risers and transport systems, to terrorist or criminal activity.
Similar content being viewed by others
References
Angrosino M (2008) Doing Ethnographic and Observational Research. CA, Sage Publications, Thousand Oaks
Anthony O-S (1990) Post-disaster housing reconstruction and social inequality: a challenge to policy and practice. Disasters 14:7–19
Autry CW, Bobbitt LM (2008) Supply chain security orientation: conceptual development and a proposed framework. Int J Logist Manag 19:42–64
Barry J (2004) Supply chain risk in an uncertain global supply chain environment. Int Jof Phys Distrib Logist Manag 34:695–697
Brewer J, Hunter A (1989) Multimethod research: a synthesis of styles. CA, Sage Publications, Newburry Park
Burns MG (2013) Estimating the impact of maritime security: financial tradeoffs between security and efficiency. J Transp Secur 6:329–338
Cooper D, Schindler P (2002) Business Research Methods 8Ed. McGraw-Hill, New York
Deming WE (1982) Quality, productivity, and competitive position. Massachusetts Institute of Technology, Center for Advanced Engineering Study Cambridge, MA
Feigenbaum, A. V. 1951. Quality control: Principles, practice and administration: An industrial management tool for improving product quality and design and for reducing operating costs and losses, McGraw-Hill.
Garvin, D. A. 1984. What does product quality really mean. Sloan management review, 26.
Giunipero LC, Eltantawy RA (2004) Securing the upstream supply chain: a risk management approach. Int J Phys Distrib Logist Manag 34:698–713
Giunipero LC, Reham Aly E (2004) Securing the upstream supply chain: a risk management approach. Int J Phys Distrib Logist Manag 34:698–713
Goldratt EM, Cox J, Whitford D (1992) The goal: a process of ongoing improvement. North River Press, New York
Helferich, O. K. & Cook, R. L. 2002. Securing the Supply Chain. Oak Brook, IL: Council of Logistics Management (CLM).
Ishikawa K, Ishikawa K (1982) Guide to quality control. Asian Productivity Organization, Tokyo
Jick TD (1979) Mixing qualitative and quantitative methods: triangulation in action. Adm Sci Q 24:602–611
Juran J, Gryna P (1951) Juran’s Quality Control Handbook. McGraw-Hill, Inc., New York City
Kalliopi S (2005) Coping with seismic vulnerability: small manufacturing firms in western athens. Disasters 29:195–212
Kolluru R, Meredith PH (2001) Security and trust management in supply chains. Inf Manag Comput Sec 9:233–236
Kvale S (2008) Doing Interviews. CA, Sage Publications Ltd, Thousand Oaks
Manuj I, Mentzer JT (2008) Global supply chain risk management strategies. Int J Phys Distrib Logist Manag 38:192–223
Rice JB, Caniato F (2003) Building a secure and resilient supply network. Supply Chain Manag Rev 22–28
Rubin HJ, Rubin I (2005) Qualitative Interviewing: The Art of Hearing Data 2nd Ed. CA, Sage Publications, Thousand Oaks
Sheffi Y (2001) Supply chain management under the threat of international terrorism. Int J Logist Manag 12:1
Shewhart WA (1931) Economic control of quality of manufactured product. N Y 501
Smith HW (1975) Startegies of Social Rsearch: The Methodogical Imagination. Engelwoods Cliffs, NJ
Smith Detection. 2009. Sabre 4000 Technical Information [Online]. Available: http://www.smithsdetection.com/media/SABRE4000_VT_EN_95588355.pdf [Accessed August 25th 2009].
Svensson G (2004) Key areas, causes and contingency planning of corporate vulnerability in supply chains: A qualitative approach. Int J Phys Distrib Logist Manag 34:728–748
Van Maanen J (1988) Tales of the Field: On Writing Ethnography. Il, The University of Chicago Press, Chicago
Véronneau S, Roy J (2009) RFID benefits, costs, and possibilities: The economical analysis of RFID deployment in a cruise corporation global service supply chain. Int J Prod Econ 122:692–702
Véronneau S, Cimon Y, Roy J (2013) A model for improving organizational continuity. J Transp Secur 6:209–220
Warren M, Hutchinson W (2000) Cyber attacks against supply chain management systems: a short note. Int J Phys Distrib Logist Manag 30:710–716
Whipple JM, VOSS MD, CLOSS DJ (2009) Supply chain security practices in the food industry. Int J Phys Distrib Logist Manag 39:574–594
Williams Z, Lueg JE, Lemay SA (2008) Supply chain security: an overview and research agenda. Int J Logist Manag 19:254–281
Williams Z, Lueg JE, Taylor RD, Cook RL (2009a) Why all the changes? Int J Phys Distrib Logist Manag 39:595–618
Williams Z, Ponder N, Autry CW (2009b) Supply chain security culture: measure development and validation. Int J Logist Manag 20:243–260
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Véronneau, S., Roy, J. Security at the source: securing today’s critical supply chain networks. J Transp Secur 7, 359–371 (2014). https://doi.org/10.1007/s12198-014-0149-z
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12198-014-0149-z