Maritime Supply Chain Security: A Critical Review
暂无分享,去创建一个
[1] Sameer Kumar,et al. Analyzing Mitigation of Container Security Risks Using Six Sigma DMAIC Approach in Supply Chain Design , 2008, Transportation Journal.
[2] Khalid Bichou,et al. The ISPS Code and The Cost of Port Compliance: An Initial Logistics and Supply Chain Framework for Port Security Assessment and Management , 2004 .
[3] P. Chalk. Maritime Piracy: Reasons, Dangers and Solutions , 2009 .
[4] Seungjin Whang,et al. Higher Supply Chain Security with Lower Cost: Lessons from Total Quality Management , 2005 .
[5] Adolf K.Y. Ng,et al. The impacts of maritime piracy on global economic development: the case of Somalia , 2010 .
[6] Francesco Longo. Supply chain security: an integrated framework for container terminal facilities , 2012, Int. J. Simul. Process. Model..
[7] Vinh V. Thai,et al. Effective maritime security: conceptual model and empirical evidence , 2009 .
[8] Harilaos N. Psaraftis,et al. Container transportation as an interdependent security problem , 2010 .
[9] Yong Zeng,et al. Secure collaboration in global design and supply chain environment: Problem analysis and literature review , 2012, Comput. Ind..
[10] Chin-Shan Lu,et al. Introduction to the special issue on maritime security , 2010 .
[11] Michel Donner,et al. Supply chain security guide , 2009 .
[12] Stéphane Dauzère-Pérès,et al. A literature review on the impact of RFID technologies on supply chain management , 2010 .
[13] Yi-Chih Yang. Risk management of Taiwan’s maritime supply chain security , 2011 .
[14] W. K. Talley,et al. Port Security and the Quality of Port Interchange Service , 2012 .
[15] Bobby J. Martens,et al. Examining Antecedents to Supply Chain Security Effectiveness: An Exploratory Study , 2011 .
[16] Juha Hintsa,et al. Voluntary Supply Chain Security Program Impacts : an Empirical Study with BASC Member Companies , 2007 .
[17] J. Lam. Risk Management in Maritime Logistics and Supply Chains , 2012 .
[18] G Janssens-Maenhout,et al. Contributing to shipping container security: can passive sensors bring a solution? , 2010, Journal of environmental radioactivity.
[19] Y. Shih,et al. Maritime safety for fishing boat operations and avoidable hijacking in Taiwan , 2010 .
[20] C. Chou,et al. Risk Analysis of Cargos Damages for Aquatic Products of Refrigerated Containers: Shipping Operators’ Perspective in Taiwan , 2012 .
[21] K. Bichou. Security and Risk-Based Models in Shipping and Ports: Review and Critical Analysis , 2008 .
[22] Ashley Roach,et al. Container and Port Security: A Bilateral Perspective , 2003 .
[23] Noah Gans,et al. Estimating the Operational Impact of Container Inspections at International Ports , 2010, Manag. Sci..
[24] S.-w. Huang,et al. Implementing a passive RFID e-seal system for transit container security: a case study of Kaohsiung Port , 2012 .
[25] Chia-Lin Wu,et al. The Role of Electronic Container Seal (E-Seal) with RFID Technology in the Container Security Initiatives , 2004 .
[26] Francesco Rizzo,et al. Improved security for commercial container transports using an innovative active RFID system , 2011, J. Netw. Comput. Appl..
[27] Gregory D. Hess,et al. International Terrorism: Causes, Consequences and Cures , 2008 .
[28] B. Wilson. Naval Diplomacy and Maritime Security in the Western Indian Ocean , 2009 .
[29] Juha Hintsa,et al. Supply Chain Security Management: an overview , 2009 .
[30] Peter Hall. “We’d Have to Sink the Ships”: Impact Studies and the 2002 West Coast Port Lockout , 2004 .
[31] F. Strozzi,et al. Supply chain risk management: a new methodology for a systematic literature review , 2012 .
[32] Khalid Bichou,et al. Assessing the impact of procedural security on container port efficiency , 2011 .
[33] Freedom Chukwudi Onuoha. Sea piracy and maritime security in the Horn of Africa: The Somali coast and Gulf of Aden in perspective , 2009 .
[34] T.C.E. Cheng,et al. A Quality Management Framework for Liner Shipping Companies to Implement the 24-Hour Advance Vessel Manifest Rule , 2007, Transportation Journal.
[35] Alan L. Erera,et al. Optimization Approaches for Efficient Container Security Operations at Transshipment Seaports , 2003 .
[36] Darren Prokop,et al. Smart Containers and the Public Goods Approach to Supply Chain Security , 2012 .
[37] Henry H. Willis,et al. Evaluating the Security of the Global Containerized Supply Chain , 2005 .
[38] Shih-Liang Chao,et al. Critical factors affecting the adoption of container security service: The shippers' perspective , 2009 .
[39] Jon S. Helmick,et al. Port and maritime security: A research perspective , 2008 .
[40] Paola Papa,et al. US and EU strategies for maritime transport security: A comparative perspective , 2013 .
[41] Stephen E. Flynn,et al. America the Vulnerable: How our Government is Failing to Protect us from Terrorism , 2004 .
[42] Khalid Bichou,et al. Risk Management in Port Operations, Logistics and Supply Chain Security , 2009 .
[43] Prakash Metaparti. Rhetoric, rationality and reality in post-9/11 maritime security , 2010 .
[44] Peter Bernard Marlow,et al. Maritime security: an update of key issues , 2010 .
[45] B. Prentice. Tangible and intangible benefits of transportation security measures , 2008 .
[46] Judith M. Whipple,et al. The Role of Strategic Security: Internal and External Security Measures with Security Performance Implications , 2009, Transportation Journal.
[47] Chad W. Autry,et al. Supply chain security orientation: conceptual development and a proposed framework , 2008 .
[48] Gi-Tae Yeo,et al. Analysis of dynamic effects on seaports adopting port security policy , 2013 .
[49] Ching-Chiao Yang,et al. The effect of supply chain security management on security performance in container shipping operations , 2013 .
[50] Y. Sheffi. Supply Chain Management Under The Threat Of International Terrorism , 2001 .
[51] Helen B. Bendall,et al. Cost of piracy: A comparative voyage approach , 2010 .
[52] R. Banomyong. The impact of port and trade security initiatives on maritime supply-chain management , 2005 .
[53] Chwen Sheu,et al. A voluntary logistics security program and international supply chain partnership , 2006 .
[54] Pierre Cariou,et al. Piracy in shipping , 2010 .
[55] Richard Oloruntoba,et al. Assurance of Security in Maritime Supply Chains: Conceptual Issues of Vulnerability and Crisis Management , 2005 .
[56] Bernd Scholz-Reiter,et al. How can Electronic Seals Contribute to the Efficiency of Global Container System? , 2009, LDIC.
[57] Yi-Chih Yang,et al. Impact of the container security initiative on Taiwan's shipping industry , 2010 .
[58] T.C.E. Cheng,et al. Institutional Perspective on the Adoption of Technology for the Security Enhancement of Container Transport , 2008 .
[59] Jessica Romero. Prevention of Maritime Terrorism: The Container Security Initiative , 2003 .
[60] Valerio Recagno,et al. Ship, port and supply chain security concepts interlinking maritime with hinterland transport chains , 2008 .
[61] Pierre Cariou,et al. Is maritime piracy random? , 2009 .
[62] Dawn M. Russell,et al. Five tenets of security-aware logistics and supply chain operation , 2003 .
[63] Sam Bateman,et al. Maritime piracy in the Indo-Pacific region – ship vulnerability issues , 2010 .
[64] Guofeng Deng,et al. Enhancing Cargo Container Security during Transportation: A Mesh Networking Based Approach , 2008, 2008 IEEE Conference on Technologies for Homeland Security.
[65] Hans-Dietrich Haasis,et al. Emergence of security in supply chain management literature , 2010 .
[66] Robert Beckman,et al. Combatting Piracy and Armed Robbery Against Ships in Southeast Asia: The Way Forward , 2002 .
[67] L. R. van der Meijden. The Influence of Modern Piracy on Maritime Commercial Transport , 2008 .
[68] Rebecca A. Dreiding,et al. Multilevel, threshold-based policies for cargo container security screening systems , 2012, Eur. J. Oper. Res..
[69] Adolf K.Y. Ng,et al. The international legal instruments in addressing piracy and maritime terrorism: A critical review , 2010 .