Skip to main content
Log in

Security at the source: securing today’s critical supply chain networks

  • Published:
Journal of Transportation Security Aims and scope Submit manuscript

Abstract

This paper focuses on the re-engineering of supply chain security processes of an international organization with global operations. This research project is based on a multimethod field study designed to evaluate, over a 12 month period, the implementation of a new security concept downstream of the central warehouse. During a 12 month field study, it was found that after new processes were in place, the organization was able to achieve substantial benefits, including increased velocity, enhanced security, and lower security costs. This research introduces the new concept of security at the source, which defines security as a fundamental criterion of quality; it borrows from quality management theory to implement a new perspective on supply chain security; and it offers a new avenue for researchers to further study this concept as a cost-effective solution to secure supply chains. The results of this research outline new processes for industries requiring enhanced security in their shipments due to the vulnerability of high-profile targets, such as high risers and transport systems, to terrorist or criminal activity.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4

Similar content being viewed by others

References

  • Angrosino M (2008) Doing Ethnographic and Observational Research. CA, Sage Publications, Thousand Oaks

    Google Scholar 

  • Anthony O-S (1990) Post-disaster housing reconstruction and social inequality: a challenge to policy and practice. Disasters 14:7–19

    Article  Google Scholar 

  • Autry CW, Bobbitt LM (2008) Supply chain security orientation: conceptual development and a proposed framework. Int J Logist Manag 19:42–64

    Article  Google Scholar 

  • Barry J (2004) Supply chain risk in an uncertain global supply chain environment. Int Jof Phys Distrib Logist Manag 34:695–697

    Article  Google Scholar 

  • Brewer J, Hunter A (1989) Multimethod research: a synthesis of styles. CA, Sage Publications, Newburry Park

    Google Scholar 

  • Burns MG (2013) Estimating the impact of maritime security: financial tradeoffs between security and efficiency. J Transp Secur 6:329–338

    Article  Google Scholar 

  • Cooper D, Schindler P (2002) Business Research Methods 8Ed. McGraw-Hill, New York

    Google Scholar 

  • Deming WE (1982) Quality, productivity, and competitive position. Massachusetts Institute of Technology, Center for Advanced Engineering Study Cambridge, MA

    Google Scholar 

  • Feigenbaum, A. V. 1951. Quality control: Principles, practice and administration: An industrial management tool for improving product quality and design and for reducing operating costs and losses, McGraw-Hill.

  • Garvin, D. A. 1984. What does product quality really mean. Sloan management review, 26.

  • Giunipero LC, Eltantawy RA (2004) Securing the upstream supply chain: a risk management approach. Int J Phys Distrib Logist Manag 34:698–713

    Article  Google Scholar 

  • Giunipero LC, Reham Aly E (2004) Securing the upstream supply chain: a risk management approach. Int J Phys Distrib Logist Manag 34:698–713

    Article  Google Scholar 

  • Goldratt EM, Cox J, Whitford D (1992) The goal: a process of ongoing improvement. North River Press, New York

    Google Scholar 

  • Helferich, O. K. & Cook, R. L. 2002. Securing the Supply Chain. Oak Brook, IL: Council of Logistics Management (CLM).

  • Ishikawa K, Ishikawa K (1982) Guide to quality control. Asian Productivity Organization, Tokyo

    Google Scholar 

  • Jick TD (1979) Mixing qualitative and quantitative methods: triangulation in action. Adm Sci Q 24:602–611

    Article  Google Scholar 

  • Juran J, Gryna P (1951) Juran’s Quality Control Handbook. McGraw-Hill, Inc., New York City

    Google Scholar 

  • Kalliopi S (2005) Coping with seismic vulnerability: small manufacturing firms in western athens. Disasters 29:195–212

    Article  Google Scholar 

  • Kolluru R, Meredith PH (2001) Security and trust management in supply chains. Inf Manag Comput Sec 9:233–236

    Google Scholar 

  • Kvale S (2008) Doing Interviews. CA, Sage Publications Ltd, Thousand Oaks

    Google Scholar 

  • Manuj I, Mentzer JT (2008) Global supply chain risk management strategies. Int J Phys Distrib Logist Manag 38:192–223

    Article  Google Scholar 

  • Rice JB, Caniato F (2003) Building a secure and resilient supply network. Supply Chain Manag Rev 22–28

  • Rubin HJ, Rubin I (2005) Qualitative Interviewing: The Art of Hearing Data 2nd Ed. CA, Sage Publications, Thousand Oaks

    Google Scholar 

  • Sheffi Y (2001) Supply chain management under the threat of international terrorism. Int J Logist Manag 12:1

    Article  Google Scholar 

  • Shewhart WA (1931) Economic control of quality of manufactured product. N Y 501

  • Smith HW (1975) Startegies of Social Rsearch: The Methodogical Imagination. Engelwoods Cliffs, NJ

    Google Scholar 

  • Smith Detection. 2009. Sabre 4000 Technical Information [Online]. Available: http://www.smithsdetection.com/media/SABRE4000_VT_EN_95588355.pdf [Accessed August 25th 2009].

  • Svensson G (2004) Key areas, causes and contingency planning of corporate vulnerability in supply chains: A qualitative approach. Int J Phys Distrib Logist Manag 34:728–748

    Article  Google Scholar 

  • Van Maanen J (1988) Tales of the Field: On Writing Ethnography. Il, The University of Chicago Press, Chicago

    Google Scholar 

  • Véronneau S, Roy J (2009) RFID benefits, costs, and possibilities: The economical analysis of RFID deployment in a cruise corporation global service supply chain. Int J Prod Econ 122:692–702

    Article  Google Scholar 

  • Véronneau S, Cimon Y, Roy J (2013) A model for improving organizational continuity. J Transp Secur 6:209–220

    Article  Google Scholar 

  • Warren M, Hutchinson W (2000) Cyber attacks against supply chain management systems: a short note. Int J Phys Distrib Logist Manag 30:710–716

    Article  Google Scholar 

  • Whipple JM, VOSS MD, CLOSS DJ (2009) Supply chain security practices in the food industry. Int J Phys Distrib Logist Manag 39:574–594

    Article  Google Scholar 

  • Williams Z, Lueg JE, Lemay SA (2008) Supply chain security: an overview and research agenda. Int J Logist Manag 19:254–281

    Article  Google Scholar 

  • Williams Z, Lueg JE, Taylor RD, Cook RL (2009a) Why all the changes? Int J Phys Distrib Logist Manag 39:595–618

    Article  Google Scholar 

  • Williams Z, Ponder N, Autry CW (2009b) Supply chain security culture: measure development and validation. Int J Logist Manag 20:243–260

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Simon Véronneau.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Véronneau, S., Roy, J. Security at the source: securing today’s critical supply chain networks. J Transp Secur 7, 359–371 (2014). https://doi.org/10.1007/s12198-014-0149-z

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s12198-014-0149-z

Keywords

Navigation