Security Based Operation in Container Line Supply Chain: a Literature Review

Container Line Supply Chain (CLSC) plays a dominant role in world cargo transportation, but also subjects to various threats during its operation due to its inherent features. The threats can not only cause disruptions for CLSC operation, they may also lead to various disasters globally. To help to manage the potential disasters, in this chapter, current research on security for CLSC operation is reviewed. Specifically, the research is divided into three categories: (1) research from a general level, including standards, regulations, codes, etc. issued by international, national and industrial organizations, aiming at improving CLSC security, (2) research on specific security issues in CLSC, e.g., threats faced by CLSC, features of CLSC, criteria for security assessment of CLSC, etc., and (3) research on different risk analysis tools and their applications in CLSC security related areas. Further, the limitations of current research are also analyzed and potential directions for future research in this field are suggested.

[1]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[2]  M. Singh,et al.  An Evidential Reasoning Approach for Multiple-Attribute Decision Making with Uncertainty , 1994, IEEE Trans. Syst. Man Cybern. Syst..

[3]  Erland Jonsson,et al.  An integrated framework for security and dependability , 1998, NSPW '98.

[4]  Oliver Lau The ten commandments of security , 1998, Comput. Secur..

[5]  S. Seshadri,et al.  Risk intermediation in supply chains , 2000 .

[6]  J. Wang,et al.  Formal safety assessment of containerships , 2001 .

[7]  Carlos Guedes Soares,et al.  Risk assessment in maritime transportation , 2001, Reliab. Eng. Syst. Saf..

[8]  Jiangping Wang The current status and future aspects in formal ship safety assessment , 2001 .

[9]  Ketil Stølen,et al.  Model-based risk assessment to improve enterprise security , 2002, Proceedings. Sixth International Enterprise Distributed Object Computing.

[10]  B. L. White,et al.  Processes and techniques for providing critical data to first responders to maritime security incidents , 2002, OCEANS '02 MTS/IEEE.

[11]  Jian-Bo Yang,et al.  On the evidential reasoning algorithm for multiple attribute decision analysis under uncertainty , 2002, IEEE Trans. Syst. Man Cybern. Part A.

[12]  Shawn A. Butler Security attribute evaluation method: a cost-benefit approach , 2002, ICSE '02.

[13]  Hau L. Lee,et al.  SUPPLY CHAIN SECURITY WITHOUT TEARS. , 2003 .

[14]  D. Stasinopoulos,et al.  Maritime Security – The Need for a Global Agreement , 2003 .

[15]  MengChu Zhou,et al.  Methods toward supply chain risk analysis , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[16]  Donald Firesmith,et al.  Common Concepts Underlying Safety, Security, and Survivability Engineering , 2003 .

[17]  Kevin Cullinane,et al.  An Economic Approach to Maritime Risk Management and Safety Regulation , 2003 .

[18]  George M. Giaglis,et al.  Minimizing logistics risk through real‐time vehicle routing and mobile technologies: Research to date and future trends , 2004 .

[19]  Risto Tuominen,et al.  Qualification of Formal Safety Assessment: an exploratory study , 2004 .

[20]  Hau L. Lee,et al.  Mitigating supply chain risk through improved confidence , 2004 .

[21]  Edmund F. McGarrell,et al.  Enhancing Security Throughout the Supply Chain , 2004 .

[22]  Shigehiko Noda Container Shipping and Security Issues: the Carriers' Responsibility in the Fight Against Terrorism , 2004 .

[23]  Jin Wang,et al.  Formal safety assessment of cruise ships , 2004 .

[24]  Ali G. Hessami A systems framework for safety and security: The holistic paradigm , 2004, Syst. Eng..

[25]  Jian-Bo Yang,et al.  Safety assessment of FPSO turret-mooring system using approximate reasoning and evidential reasoning , 2005 .

[26]  Harilaos N. Psaraftis,et al.  EU Ports Policy: Where do we Go from Here? , 2005 .

[27]  Jian-Bo Yang,et al.  Engineering System Safety Analysis and Synthesis Using the Fuzzy Rule‐based Evidential Reasoning Approach , 2005 .

[28]  Henry H. Willis,et al.  Evaluating the Security of the Global Containerized Supply Chain , 2005 .

[29]  R. Banomyong The impact of port and trade security initiatives on maritime supply-chain management , 2005 .

[30]  D. Towill The impact of business policy on bullwhip induced risk in supply chain management , 2005 .

[31]  Ian Jenkinson,et al.  An offshore safety assessment framework using fuzzy reasoning and evidential synthesis approaches , 2005 .

[32]  Jian-Bo Yang,et al.  Belief rule-base inference methodology using the evidential reasoning Approach-RIMER , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[33]  Ravi Sarathy,et al.  Security and the Global Supply Chain , 2006, Transportation Journal.

[34]  Marc Levinson,et al.  The Box: How the Shipping Container Made the World Smaller and the World Economy Bigger , 2006 .

[35]  Christopher S. Tang Robust strategies for mitigating supply chain disruptions , 2006 .

[36]  Zaili Yang Risk assessment and decision making of container supply chains , 2006 .

[37]  Brian Tomlin,et al.  On the Value of Mitigation and Contingency Strategies for Managing Supply Chain Disruption Risks , 2006, Manag. Sci..

[38]  Martha C. Wilson,et al.  The impact of transportation disruptions on supply chain performance , 2007 .

[39]  Shuen-Tai Ung The development of safety and security assessment techniques and their application to port operations , 2007 .

[40]  O. Khan,et al.  Risk and supply chain management: creating a research agenda , 2007 .

[41]  Niyazi Onur Bakir A Brief Analysis Of Threats And Vulnerabilities In The Maritime Domain , 2007 .

[42]  S. Chopra,et al.  Supply Chain Management: Strategy, Planning & Operation , 2007 .

[43]  Sang-Hwa Chung,et al.  Design and Implementation of an Active RFID System for Fast Tag Collection , 2007, 7th IEEE International Conference on Computer and Information Technology (CIT 2007).

[44]  M. Perry Natural disaster management planning , 2007 .

[45]  Scott Webster,et al.  Channel Coordination for a Supply Chain with a Risk-Neutral Manufacturer and a Loss-Averse Retailer , 2007, Decis. Sci..

[46]  M. Christopher,et al.  The impact of product design on supply chain risk: A case study , 2008 .

[47]  Sandeep K. S. Gupta,et al.  Intelligent networked containers for enhancing global supply chain security and enabling new commercial value , 2008, 2008 3rd International Conference on Communication Systems Software and Middleware and Workshops (COMSWARE '08).

[48]  Jon S. Helmick,et al.  Port and maritime security: A research perspective , 2008 .

[49]  K. Bichou Security and Risk-Based Models in Shipping and Ports: Review and Critical Analysis , 2008 .

[50]  Wayne K. Talley Maritime Safety, Security and Piracy , 2008 .

[51]  J. Mentzer,et al.  GLOBAL SUPPLY CHAIN RISK MANAGEMENT , 2008 .

[52]  Ian Jenkinson,et al.  An Offshore Risk Analysis Method Using Fuzzy Bayesian Network , 2009 .

[53]  Christos A. Kontovas,et al.  Formal safety assessment: A critical review , 2009 .

[54]  Thomas J. Goldsby,et al.  Supply chain risks: a review and typology , 2009 .

[55]  Edward McCormack,et al.  Evaluating the Use of Electronic Door Seals (E-Seals) on Shipping Containers , 2010, Int. J. Appl. Logist..

[56]  Dimitrios A Tsamboulas,et al.  Terrorism and the Threat to Multimodal Transport – An Overview , 2010 .

[57]  Jc Jan Fransoo,et al.  Ocean Container Transport: An Underestimated and Critical Link in Global Supply Chain Performance , 2010 .

[58]  James B. Rice,et al.  Formal Vulnerability Assessment of a maritime transportation system , 2011, Reliab. Eng. Syst. Saf..

[59]  Yi-Chih Yang Risk management of Taiwan’s maritime supply chain security , 2011 .

[60]  S. Rahman Reliability Engineering and System Safety , 2011 .

[61]  Nicholas J. Bahr System safety engineering and risk assessment , 2013 .