A critical review of container security operations

ABSTRACT Containers, which permit fast and safe handling between modal systems, are the main equipment used in intermodal transport. Unfortunately, enhancement of the efficiency and velocity of container operations has created a breach in traditional security, also known as container security. This paper presents a critical literature review of container security operations. We aim to identify current trends and future research directions in container security. We propose a classification framework based on the following elements: presenting the container security perspective, identifying threats, evaluating container security, balancing costs/benefits and the degree of security, balancing time savings/reduction and the degree of security, and securing containerized transportation processes. We discuss the current studies of these problems, the methodologies adopted and important insights into container security.

[1]  Catherine L. Mann,et al.  Trade Facilitation and Economic Development : New Approach to Quantifying the Impact , 2003 .

[2]  Chin-Shan Lu,et al.  Safety leadership and safety behavior in container terminal operations , 2010 .

[3]  Jun Zhuang,et al.  Balancing congestion and security in the presence of strategic applicants with private information , 2011, Eur. J. Oper. Res..

[4]  Dong-Ling Xu,et al.  Security Based Operation in Container Line Supply Chain: a Literature Review , 2013 .

[5]  Khalid Bichou,et al.  Overview of contemporary supply chain security initiatives , 2014 .

[6]  Qingcheng Zeng,et al.  Optimization Model for Truck Appointment in Container Terminals , 2013 .

[7]  Mohd Rizaimy Shaharudin,et al.  The impact of supply chain security practices on security operational performance among logistics service providers in an emerging economy: Security culture as moderator , 2015 .

[8]  Paul Davidsson,et al.  A Market-Based Approach to Container Port Terminal Management , 2002 .

[9]  Hau L. Lee,et al.  Higher supply chain security with lower cost: Lessons from total quality management , 2005 .

[10]  Constantinos,et al.  An Analysis of Formal Risk Assessments for Safety and Security in Ports: Empirical Evidence from Container Terminals in Greece , 2012 .

[11]  Niyazi Onur Bakir,et al.  Is Better Nuclear Weapon Detection Capability Justified? , 2011 .

[12]  EORG S CHAUR,et al.  Time as a Trade Barrier , 2013 .

[13]  Stuart Shapiro,et al.  The Benefit-Cost Analysis of Security Focused Regulations , 2009 .

[14]  Ning Wang,et al.  An Intelligent Spatial Collision Risk Based on the Quaternion Ship Domain , 2010, Journal of Navigation.

[15]  Lawrence B. Holder,et al.  Game-Based Simulation for the Evaluation of Threat Detection in a Seaport Environment , 2008, ICEC.

[16]  George F. List,et al.  Using time-varying tolls to optimize truck arrivals at ports , 2011 .

[17]  Adolf K.Y. Ng,et al.  The impacts of maritime piracy on global economic development: the case of Somalia , 2010 .

[18]  Tae-Hun Kim,et al.  Ubiquitous Containerized Cargo Monitoring System Development based on Wireless Sensor Network Technology , 2011, Int. J. Comput. Commun. Control.

[19]  Alan C. McKinnon,et al.  Efficient Hinterland Transport Infrastructure and Services for Large Container Ports , 2013 .

[20]  Yi-Chih Yang Risk management of Taiwan’s maritime supply chain security , 2011 .

[21]  Yu Ding,et al.  Decision Fusion from Heterogeneous Sensors in Surveillance Sensor Systems , 2011, IEEE Transactions on Automation Science and Engineering.

[22]  Yu Ding,et al.  Detecting Nuclear Materials Smuggling: Performance Evaluation of Container Inspection Policies , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[23]  Saurabh Chandra Container Security Management; A State-of-the-Art Literature Review and Research Agenda , 2015 .

[24]  Lee Cordner Maritime security: a new outlook , 2015 .

[25]  Chung-Yee Lee,et al.  The Critical Role of Ocean Container Transport in Global Supply Chain Performance , 2013 .

[26]  Franck Guarnieri,et al.  A Bayesian network to manage risks of maritime piracy against offshore oil fields , 2014 .

[27]  Kap Hwan Kim,et al.  Negotiating truck arrival times among trucking companies and a container terminal , 2015 .

[28]  Mieczyslaw Szustakowski,et al.  Passive automatic anti-piracy defense system of ships , 2013, Optics/Photonics in Security and Defence.

[29]  Guanghui Lan,et al.  Algorithms for optimizing the placement of stationary monitors , 2015 .

[30]  Xinping Yan,et al.  Effectiveness of maritime safety control in different navigation zones using a spatial sequential DEA model: Yangtze River case. , 2015, Accident; analysis and prevention.

[31]  Jose Emmanuel Ramirez-Marquez,et al.  An evolutionary algorithm for port-of-entry security optimization considering sensor thresholds , 2010, Reliab. Eng. Syst. Saf..

[32]  Niyazi Onur Bakir A Brief Analysis Of Threats And Vulnerabilities In The Maritime Domain , 2007 .

[33]  Francesco Longo,et al.  Design and integration of the containers inspection activities in the container terminal operations , 2010 .

[34]  S Bonsall,et al.  Use of Fuzzy Evidential Reasoning in Maritime Security Assessment , 2009, Risk analysis : an official publication of the Society for Risk Analysis.

[35]  Benoît Demil,et al.  The box : how the shipping container made the world smaller and the world economy bigger , 2006 .

[36]  Qiang Meng,et al.  Quantitative Risk Assessment Model for Ship Collisions in the Singapore Strait , 2014 .

[37]  Susan E. Martonosi,et al.  Applying Risk Assessment To Secure The Containerized Supply Chain , 2007 .

[38]  Jose Emmanuel Ramirez-Marquez,et al.  Optimization of container inspection strategy via a genetic algorithm , 2011, Ann. Oper. Res..

[39]  Jeffery Karafa SIMULATING GATE STRATEGIES AT INTERMODAL MARINE CONTAINER TERMINALS by , 2012 .

[40]  Niyazi Onur Bakir A Stackelberg game model for resource allocation in cargo container security , 2011, Ann. Oper. Res..

[41]  Salam Abdulqadir Abdulrahman,et al.  Energy, governance and security in Thailand and Myanmar (Burma): a critical approach to environmental politics in the South , 2018, International Journal of Environmental Studies.

[42]  Youfang Huang,et al.  Simulation-based heuristic method for container supply chain network optimization , 2015, Adv. Eng. Informatics.

[43]  Jose Emmanuel Ramirez-Marquez,et al.  Optimization of inspection for dual contraband using a genetic algorithm , 2012 .

[44]  Gregory Levitin,et al.  Optimal resource distribution between protection and redundancy considering the time and uncertainties of attacks , 2015, Eur. J. Oper. Res..

[45]  Rommert Dekker,et al.  A chassis exchange terminal to reduce truck congestion at container terminals , 2013 .

[46]  Khalid Bichou,et al.  Assessing the impact of procedural security on container port efficiency , 2011 .

[47]  John J. Barthelmes,et al.  Homeland Security and Emergency Management , 2013 .

[48]  Peter Bernard Marlow,et al.  Maritime security: an update of key issues , 2010 .

[49]  Paola Papa,et al.  US and EU strategies for maritime transport security: A comparative perspective , 2013 .

[50]  Wilbert E. Wilhelm,et al.  Branch-and-Price Decomposition to Design a Surveillance System for Port and Waterway Security , 2010, IEEE Transactions on Automation Science and Engineering.

[51]  Vicki M. Bier,et al.  Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation , 2011, Decis. Anal..

[52]  Jakub Montewka,et al.  A framework for risk assessment for maritime transportation systems - A case study for open sea collisions involving RoPax vessels , 2014, Reliab. Eng. Syst. Saf..

[53]  Yi Ding,et al.  Identification of efficiency factors for inspection and quarantine clearance using an improved structural equation model , 2014 .

[54]  Jaeyoung Cho,et al.  Under-water sonar placement , 2014 .

[55]  Vicki M. Bier,et al.  Target-oriented utility theory for modeling the deterrent effects of counterterrorism , 2015, Reliab. Eng. Syst. Saf..

[56]  Yonghong Liu,et al.  Application of Bayesian Networks in Quantitative Risk Assessment of Subsea Blowout Preventer Operations , 2013, Risk analysis : an official publication of the Society for Risk Analysis.

[57]  R. Banomyong The impact of port and trade security initiatives on maritime supply-chain management , 2005 .

[58]  Shailesh Nayak,et al.  Coastal Vulnerability Assessment for Orissa State, East Coast of India , 2010 .

[59]  Jaouad Boukachour,et al.  Building an Expert-System for Maritime Container Security Risk Management , 2011, Int. J. Appl. Logist..

[60]  Noah Gans,et al.  Estimating the Operational Impact of Container Inspections at International Ports , 2010, Manag. Sci..

[61]  Darren Prokop,et al.  Smart Containers and the Public Goods Approach to Supply Chain Security , 2012 .

[62]  Vicki M. Bier,et al.  Analytical method to identify the number of containers to inspect at U.S. ports to deter terrorist attacks , 2011, Ann. Oper. Res..

[63]  Yi Hu,et al.  Throughput estimation based port development and management policies analysis , 2016 .

[64]  V. Tummala,et al.  Assessing and Managing Risks Using the Supply Chain Risk Management Process (SCRMP) , 2011 .

[65]  Feng Pan,et al.  Network deployment of radiation detectors with physics-based detection probability calculations , 2011, Ann. Oper. Res..

[66]  Carsten Maple,et al.  A novel risk assessment and optimisation model for a multi-objective network security countermeasure selection problem , 2012, Decis. Support Syst..

[67]  Yada Zhu,et al.  Multiobjective Optimization of a Port-of-Entry Inspection Policy , 2010, IEEE Transactions on Automation Science and Engineering.

[68]  Henrik Sternberg,et al.  Exploring security effects on transport performance , 2013 .

[69]  Yu Ding,et al.  Detecting nuclear materials smuggling: using radiography to improve container inspection policies , 2011, Ann. Oper. Res..

[70]  Jose Emmanuel Ramirez-Marquez,et al.  Protecting critical infrastructures against intentional attacks: a two-stage game with incomplete information , 2013 .

[71]  Rebecca A. Dreiding,et al.  Multilevel, threshold-based policies for cargo container security screening systems , 2012, Eur. J. Oper. Res..

[72]  Paul B. Kantor,et al.  Optimal sequential inspection policies , 2011, Ann. Oper. Res..

[73]  Margherita Pero,et al.  Increasing security and efficiency in supply chains: a five-step approach , 2014 .

[74]  Ching-Chiao Yang,et al.  The effect of supply chain security management on security performance in container shipping operations , 2013 .

[75]  Dong-Ping Song,et al.  Flow balancing-based empty container repositioning in typical shipping service routes , 2011 .

[76]  Z. Yang,et al.  Maritime safety analysis in retrospect , 2013 .

[77]  Joanne Ellis,et al.  Analysis of accidents and incidents occurring during transport of packaged dangerous goods by sea , 2011 .

[78]  Xiaojun Shan,et al.  Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection - A Three-Stage Game , 2014, Decis. Anal..

[79]  David A. Menachof,et al.  Using portfolio optimisation to calculate the efficient relationship between maritime port security residual risk and security investment , 2014 .

[80]  Catherine A. Cardno Preparing for the Big One , 2015 .

[81]  Khalid Bichou,et al.  Risk-Based Cost Assessment of Maritime and Port Security , 2010 .

[82]  Jason R. W. Merrick,et al.  A Comparative Analysis of PRA and Intelligent Adversary Methods for Counterterrorism Risk Management , 2011, Risk analysis : an official publication of the Society for Risk Analysis.

[83]  Laura A. McLay,et al.  Interdicting nuclear material on cargo containers using knapsack problem models , 2011, Ann. Oper. Res..

[84]  David P. Morton,et al.  Prioritized interdiction of nuclear smuggling via tabu search , 2015, Optim. Lett..

[85]  Francesco Rizzo,et al.  Improved security for commercial container transports using an innovative active RFID system , 2011, J. Netw. Comput. Appl..

[86]  Xxyyzz Civil Engineering Magazine , 1900 .

[87]  Tayfur Altiok,et al.  A mixed integer programming framework for sonar placement to mitigate maritime security risk , 2012 .

[88]  Min Xie,et al.  Subjective operational reliability assessment of maritime transportation system , 2011, Expert Syst. Appl..

[89]  Yu Ding,et al.  Using container inspection history to improve interdiction logistics for illicit nuclear materials , 2013 .

[90]  Gi-Tae Yeo,et al.  Analysis of dynamic effects on seaports adopting port security policy , 2013 .

[91]  Jingjing Xu,et al.  An analysis of safety and security risks in container shipping operations: A case study of Taiwan , 2014 .

[92]  Justin M. Beaver,et al.  Decision-level information fusion to assess threat likelihood in shipped containers , 2009, 2009 IEEE Conference on Technologies for Homeland Security.

[93]  Yada Zhu,et al.  Port-of-Entry Inspection: Sensor Deployment Policy Optimization , 2009, IEEE Transactions on Automation Science and Engineering.

[94]  Timothy J. Leonard,et al.  Security challenges in United States sea ports: an overview , 2015 .

[95]  Jose Emmanuel Ramirez-Marquez,et al.  Optimal design of container inspection strategies considering multiple objectives via an evolutionary approach , 2012, Ann. Oper. Res..

[96]  Parker. Laite,et al.  Maritime trade security : promoter of terrorism? , 2010 .

[97]  Jannette Huberts,et al.  Library of Congress. Congressional Research Service , 2016 .

[98]  Xiangtong Qi,et al.  Minimizing fuel emissions by optimizing vessel schedules in liner shipping with uncertain port times , 2012 .

[99]  Mitra Fouladirad,et al.  Condition-based inspection/replacement policies for non-monotone deteriorating systems with environmental covariates , 2010, Reliab. Eng. Syst. Saf..

[100]  Dong-Ping Song,et al.  Risk analysis for container shipping: from a logistics perspective , 2015 .

[101]  David Hummels,et al.  Time as a Trade Barrier , 2002, GTAP Working Paper.

[102]  Rebecca A. Dreiding Allocating Homeland Security Screening Resources Using Knapsack Problem Models , 2010 .

[103]  Joseph Geunes,et al.  Modern network interdiction problems and algorithms , 2013 .

[104]  Jin Wang,et al.  An advanced risk analysis approach for container port safety evaluation , 2014 .

[105]  Rebecca A. Dreiding,et al.  An integrated model for screening cargo containers , 2013, Eur. J. Oper. Res..

[106]  J. Rene Villalobos,et al.  A multi-objective optimization primary planning model for a POE (Port-of-Entry) inspection , 2012 .

[107]  Ingrid Bouwer Utne,et al.  Human Fatigue’s Effect on the Risk of Maritime Groundings - A Bayesian Network Modeling Approach , 2014 .

[108]  Johan Pieter de Villiers,et al.  Maritime piracy situation modelling with dynamic Bayesian networks , 2015, Inf. Fusion.

[109]  Michael D. Greenberg,et al.  Maritime Terrorism: Risk and Liability , 2006 .

[110]  Shehu Usman Gidado Cargo Risk Management in International Transport and Logistics , 2016 .

[111]  Yi-Chih Yang,et al.  Impact of the container security initiative on Taiwan's shipping industry , 2010 .

[112]  Qiang Meng,et al.  An Overview of Maritime Waterway Quantitative Risk Assessment Models , 2012, Risk analysis : an official publication of the Society for Risk Analysis.

[113]  Francesco Longo,et al.  Performance Analysis of a Southern Mediterranean Seaport via Discrete-Event Simulation , 2013 .

[114]  Jason R. W. Merrick,et al.  Is Screening Cargo Containers for Smuggled Nuclear Threats Worthwhile? , 2010, Decis. Anal..

[115]  T. Notteboom,et al.  The effect of high fuel costs on liner service configuration in container shipping , 2009 .

[116]  Zaili Yang,et al.  A new risk quantification approach in port facility security assessment , 2014 .

[117]  Jorma Rytkönen,et al.  Maritime safety and security : Literature review , 2012 .

[118]  C. Mann,et al.  Trade Facilitation and Economic Development : New Approach to Quantifying the Impact , 2003 .

[119]  Vinh V. Thai,et al.  Do port security quality and service quality influence customer satisfaction and loyalty? , 2016 .

[120]  Supply Chain Security in Container Transport Recommendations towards an Improved Information System Architecture PROTECT work package 5 , 2007 .