Using business complexity to handle supply chain risk: Dealing with borders of cargo liability (CORE1209)

Summary: The dominant part of the academic literature on supply chain management assumes that decisions are based on objectivity, determinism and rational choices. They consider seldom complexity of the networks and casting defects that are due to deviating organizational structures and information systems. In order to manage complex risks companies may be willing to make decisions that reduce their own risks at the expense of other supply chain partners. That is an old maid game. The paper presents two cases, where logistics actors confine one-sided own liabilities instead of reducing risks in the whole network. The paper can be viewed here: http://www.intechopen.com.

[s2If is_user_logged_in()]

Full review: Rational reasoning and responsibilities stated in agreements and contracts are assumed to create baseline for decisions in supply chain management. If contracts do not give clear answers, we assume partners can be brought into a fair and impartial agreement.  In general, cooperation and information sharing are seen to produce long-term benefits for all stakeholders. These assumptions hide situations where logistics partners are prone to make opportunistic and subjective decisions.

In real life managers must be able to dynamically adapt logistics processes to unexpected harmful events, last-minute changes and rearrangements with very limited information about the situation and consequences of their decisions. One-sided simplifications are natural responses to reduce responsibilities of the company. The paper presents two cases where logistics risks are transferred at the expense of other supply chain partners. In the first case logistic company implements a camera surveillance system in own warehouses in order protect the company against inappropriate security claims (e.g. due to damages during transportation). In the second case a leading wholesaler creates strict rules how suppliers are allowed to deliver shipments in warehouses and how the wholesaler penalizes non-compliant deliveries. In both cases risk transferring strategy leads old maid game, not to mitigation of overall supply chain risks. The strategies may even increase risk and reduce motivation to collaborate in the supply chain network.

The paper illuminates possible unexpected and unwanted outcomes in the CORE project. Simplifications and narrow approaches are known to reduce supply chain resilience. First, they may lead to the loss of crucial information. Second, partners may be prone to pay more attention to own tasks and less to interdependencies with other partners. The CORE work packages that produce only technological solutions to meet minimum legislative data sharing requirements are vulnerable to the risk. The same vulnerability concerns organizational designs, where a focal company acts as a supply chain orchestrator and defines one-sided technical specifications for other trading partners. The comprehensive approach would increase visibility in the whole end-to-end supply chain and increase motivation for collaboration between partners.

Reference: D. Ekwall, F. Nilsson, 2008 “Using business complexity to handle supply chain risk: Dealing with borders of cargo liability”. In proceedings of Nofoma 2008, Helsinki

 

CORE1209

[/s2If]

Managing the Unexpected – Sustained Performance in a Complex World (CORE1208)

Summary: The book highlights characteristics of organizations that are capable to improve efficiency and manage their risk in challenging operative environments. According to the writers these high reliable organizations pay especially attention to small failures, real-time operations, alternative pathways to keep going and mobilization of expertise. The book presents how quality and continuous improvement philosophy eroded in manufacturing company causing a recall of 10 million vehicles and how they recovered from the crisis. The book can be purchased here www.wiley.com.

[s2If is_user_logged_in()]

Full review: Logistics networks are prone to disruptions and inefficiencies due to inconsistencies in organizational structures and cultures, human nature to searching simplified answers to complex problems and lack of collective commitment and competence necessary to sustain performance under trying conditions. The book describes characteristics of mindful organizations that are capable to perform reliably in complex environment. These organizations have unique culture, capabilities for self-design, networks build on expertise, hybrid structures with special attention to redundancy and continuity, special training and routines to maintain situational awareness, mind-sets to make sense out of emerging patterns, relational strategies to adapt to local environment and efficient information processing.

The CORE project aims at utilizing real-time data in order to increase visibility over movements of shipments. This is expected to improve abilities to re-plan resources if required due to detected risks or unexpected disruptions. The paper give advises how to create an infrastructure that supports sense making, continuous organizing and adaptive management in complex environment. The infrastructure make possible to convert observations of anomalies into explicit event types, categories, routines, instructions and roles. During the process abstract management concepts get refined organization specific meanings. However, sense making, continuous organizing and adaptive management prerequisite honesty and transparency in reporting and willingness to base actions on them. Besides, observations must be integrated into reports without underestimating or belittling observations that have no immediate explanations. The book can be used as user manual how organization can make most use of new data in order to respond earlier and adapt to unexpected situations.

The CORE project itself is a complex project comprising over 60 partners, 22 work packages and hundreds of interrelated tasks. The CORE management pays special attention to ensure sustained performance. First, consortium members work with concepts that enable them to cluster observations from real-time case and identify emerging patterns (sustained awareness). Second, partners have a variety of technological and operational expertise from academic, governmental and private sector. Respectful interaction and heedful interrelating support creation of shared understanding in non-obvious cases and their explanations (sustained surfacing). Third, ambiguity is implicitly or even explicitly acknowledged and accepted to be part of the project. However, ambiguity does not stop the work. It is an active part of problem solving (sustained organizing). Forth, when the CORE demonstrations progress, new details and nuances are discovered. Concepts and case studies are continuously updated (sustained updating). Fifth, tasks and problems are ambiguous, that creates often discomfort among partners. That creates a strong propensity to simplify problems and find or even create traditional solutions. CORE Management team avoids making rigid decisions, but they give directions, which by definition are dynamic, open to improvement, self-correcting, responsive and transparently reasoned (sustained agency). Sixth, human beings tend to simplify their interpretations and underestimate how much crucial information is then lost. In addition, we tend to pay more attention to own tasks and less to interconnected tasks of other partners. CORE partners are experienced to align tasks in a way that they maximize common good (sustained variety). Seventh, the CORE project highlight continuing adaption that reduces need to make radical changes. The CORE management team encourages partners to update their conceptions through paying closer attention to demonstrations. Bsides, management team facilitates respectful interaction through workshops.

Reference: Weick, Karl E. & Sutcliffe, Kathleen M. (2015). Managing the Unexpected: Sustained Performance in Complex World. 3rd Edition.

[/s2If]

Towards Trusted Trade-lanes (CORE1207)

Summary: The paper explores the concept of trusted trade-lane. In trusted trade-lanes operators implement an internal control system that makes possible to detect, handle and report dubious events in a way that meet requirements of customs agencies. Writers identify three essential characteristics of trusted trade-lanes: single partners are considered reliable and trustworthy, collaboration is based on long-term partnerships powered by viable business opportunities and managed by a clear decision-making mechanism, and control systems ensures integrity of traded goods and transferred data. In addition, the paper presents three alternative scenarios how the trusted partnerships can be designed in cross-border trade. The paper can be viewed here: https://pure.uvt.nl.

[s2If is_user_logged_in()]

Full review: The paper present recent developments in designing forms of partnerships that make possible to manage, predict and reconstruct supply chain operations and events. Customs agencies can use the control system to complete law enforcement and administrative tasks in a way they can reduce or even refrain from physical inspections and checks. The trading partners that have adopted the common control system and expanded it to the needs of regulatory bodies form trusted trade-lanes. Writers identify three essential characteristics of a trusted trade-lane. First, all partners operate transparently, reliable and trustworthy in their business relationships.  Second, partners are committed in long-term collaboration that gives all partners opportunities to succeed. The government structure has clear decision making mechanisms and selected legal representative. Third, partners must implement and manage a control system that ensures integrity of transported goods and transformed data within the partners and to the authorities.

The writers design three alternatives how partnerships can evolve into trusted trade-lanes. First, a focal company can act as a supply chain orchestrator and provider technical infrastructure for use of trading partners and logistics operators. The focal company lodges customs declarations and risk information to customs administrations on behalf of the trusted trade-lane partners. In the second alternative, a service provider manages a peer-to-peer information platform that supply chain operators use to communicate between each other and with customs agencies. Data on the platform is reused for both commercial and regulatory purposes (piggy packing). Partners can join and leave the platform as they see appropriate. The platform uses open standards and database management systems. Third, a service provider offers additional ‘assurance’ services for legally independent companies of a specific industrial area. The service provider acts as a trusted trader and defines common rules and requirements for the membership.

The paper demonstrates preliminary results in the CORE project. The project partners adapt trusted trade-lane concept in their own concrete business and logistics processes as well as in their information systems. The models and scenarios are further amended and developed during the project.

Reference: Hulstijn, J., Hofman, W., Zomer, G., & Tan, Y-H. (2016). Towards trusted trade-lanes. In H. J. Scholl, O. Glassey, M. Janssen, & E. (Eds.), Proceedings of the 15th IFIP E-Government conference (EGOV 2016): Electronic Government. (pp. 299-311). (Lecture Notes in Computer Science; Vol. 9820). Guimaraes, Portugal: Springer International Publishing.

 

CORE1207

[/s2If]

Supply chain security culture: measure development and validation, 2009 (CORE1200)

Summary: Supply chain security culture (SCSC) is as an overall organizational philosophy embracing norms and values that keep employees vigilant when performing supply chain security practices. The article presents a scale that makes possible to gauge supply chain security culture and its correlation to organization’s ability to respond to unexpected disruptions. Employees are asked to assess two topics: security strategy of the company and impacts of significant supply chain breech to business operations. According the study improved supply chain security culture makes company more resilient against major disruptions. This research helps executives to justify their expenditures on security efforts. The reviewed document can be purchased here: http://dx.doi.org.

[s2If is_user_logged_in()]

Full review: Researchers have stressed the importance of having an organizational culture that highlights proactivity and vigilance toward supply chain security breaches. In security-focused supply chain management environment workers are empowered to detected and handle supply chain security threats without seeking formal permission from supervisors and managers. Company security strategy gives specific attention how SCS concepts are embedded into firm processes and procedures. Alignment with organizational culture and business or corporate-level strategies is believed to result in enhanced organizational performance. In addition, organization culture encompasses supply chain continuity management. The paper presents a scale for measuring supply chain security culture defined as the overall organizational philosophy that creates supply chain security as a priority among its employees through embracing and projecting norms and values to support secure activities and to be vigilant with security efforts.

The study makes possible to assess how implemented FP7-CORE security technologies, tools and practices influence on supply chain resilience based on the perception of company managers and employees. The article gives also guidelines how to develop survey forms and protocols in order to assess the influence of implemented security measures on other KPIs such as supply chain visibility and reliability. The survey tools based on perceived operational and organizational changes complete toolbox to measure impacts of introduced security interventions.

Reference: Zachary Williams, Nicole Ponder, Chad W. Autry, “Supply chain security culture: measure development and validation”, The International Journal of Logistics Management, Vol. 20 Iss: 2, pp.243 – 260

 

CORE1200

[/s2If]

Enhancing security through efficiency focus- Insights from a multiple stakeholder pilot implementation (Sternberg et al. 2012)

Summary

Efficiency and security are said to be opposing goals of logistics operations: when security goes up, efficiency decreases, and vice versa. Yet, it is suggested that information technologies could improve efficiency and security simultaneously. Sternberg et al. (2012) investigate this hypothesis: whether and to what extent increased attention to efficiency results in improved security in carrier operations in a seaport context. In a longitudinal case study, they research carrier operations in connection with port terminals carrying out Roll-in Roll-out (RoRo) operations on trailers at the port of Gothenburg. They find that investments in new ICT solutions, in fact, remove some of the barriers to higher efficiency and improve security against cargo theft and terrorism. In particular, they report that ICT investments increased efficiency in terms of reduced waiting times and increased ability to plan port operations (pre-arrival notification) and fast positioning of trailers in a port. The new ICT solutions also increased security in terms of more secure document handling (decreases the risk that sensitive information falls into the hands of criminals), better anomaly detection (helps customs identify trailers that are most likely tampered in-transit) and increased visibility. The abstract is available at: http://onlinelibrary.wiley.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

This article is relevant for CORE demonstrations that focus on sea port operations (WP10-11 and WP13-15 and WP17). The research shows how a ‘common information sharing platform’ – an electronic and highly automated communication network among LSPs, carriers, ferry operators, port operators and authorities – increases logistics efficiency and security performance simultaneously. The main components of this platform include information sharing through a common information area, real-time geographical position of truck and trailer, identification technology in truck, RFID tags on transport units and RFID readers mounted on terminals, electronic manifest, and electronic container seals. More specifically, Sternberg et al. (2012) observed that adoption of a set of IT-enabled SCS solutions eliminated logistics efficiency and security issues simultaneously:

  • Real-time geo-positioning of trucks and trailers enabled the port operator to allocate a vacant spot for a trailer prior to its arrival, which reduced the waiting time at the port entrance. The real-time information enabled also customs to detect anomalies in shipping schedules and routings that would imply a heightened risk of smuggling.
  • RFID-based identification of drivers, trucks, and trailers automated and accelerated the access formalities at the port entrance and increased reliability of driver authentication.
  • Digitalization of cargo manifests eliminated the time-consuming manual document handling and reduced the risk of unauthorised access to confidential information.
  • E-seals enabled customs officers to identify intact containers and spare them from time- consuming inspections.

Reference

Sternberg, H., Nyquist, C., & Nilsson, F. (2012). Enhancing Security Through Efficiency Focus—  Insights from a Multiple Stakeholder Pilot Implementation. Journal of Business Logistics, 33(1), 64-73.

[/s2If]

Global supply chain design considerations: Mitigating product safety and security risks (Speier et al. 2011)

Summary

There is a broad consensus among supply chain professionals that supply chain disruptions are very bad for business: supply chain glitches commonly lower operational performance and reduce shareholder value. Regardless of this, there is surprisingly little research on supply chain design strategies that have the highest potential to mitigate the risk of disruptions. Based on interviews with 75 US-based managers, an industry survey and a case study, Speier et al. (2011) identify types of SCS strategies and examine how contextual factors influence business managers to select a set of SCS design strategies. They argue that the depth and breadth of security initiatives depend mainly on top management mindfulness, operational complexity, product risk and coupling. The abstract is available at: http://www.sciencedirect.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

The paper of Speier et al. (2011) is quite theoretical and it has therefore only a limited impact on CORE work. It is useful for people for the CORE demonstrators to be aware of various supply chain design strategies and factors that support their selection. All in all, the paper introduces an interesting table that shows what supply chain factors typically affect selection of certain supply chain design strategies (see table below). The paper also includes a useful discussion about the nature of supply chain security risks. The authors point out that supply chain security covers risks of contamination, damage and destruction of products or other supply chain assets, and that these risks may arise from intentional or unintentional activities.

coreobservatory300620162

Reference

Speier, C., Whipple, J. M., Closs, D. J., & Voss, M. D. (2011). Global supply chain design considerations: mitigating product safety and security risks. Journal of Operations Management, 29(7), 721-736.

[/s2If]

Controlling access to pick-up and delivery vans: the cost of alternative measures (Haelterman et al. 2012)

Summary

The situational crime prevention theory suggests that preventive security measures often backfire. For this reason, it is problematic that many managers do not have a holistic picture which kind of considerations should precede selection of implementation of security measures. A paper by Haelterman et al. (2012) tests the practical feasibility of a new management model that is designed to highlight the most promising preventive security measures given a set of preconditions and costs. The authors apply this model in the context of pick-up and delivery van operations at a Belgian branch of a major express courier company. Such transport operations are subject to risk of theft and terrorism, especially if unauthorized people managed break into pick-up and delivery vans. To test the management model, the authors collect views of of supply chain practitioners in two expert panels and through a survey. Their analysis covers a broad array of preventive security measures including key card, audible alarm, silent alarm + GPS, notification on vehicles, awareness training, no company logos, formal instructions / compliance checks & sanctioning, double drivers, over security escorts. The abstract is available at: http://link.springer.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

The research of Haelterman et al. (2012) sets a solid theoretical basis for practical supply chain security work. All CORE work packages that cover aspects of road transport benefit from the analysis of this research paper. The research shows that a set of preconditions influence outcomes of preventive security measures: availability (legal, infrastructure), practicability (perceived), required knowledge, required expertise, user awareness, user belief, use commitment (anticipated), and co-operation. Security measures also incur different kinds of costs: financial costs, ethical/social cost (labeling, distrust, civil liberties, inequalities), aesthetical cost. Finally, as the theory on situational crime prevention suggests, security measures may result into various reverse effects, including crime displacement (geographical, temporal, target, tactical, crime types), escalating effects (e.g., use of violence), creative adaptation, and enticement effects.

Reference

Haelterman, H., Callens, M., & Vander Beken, T. (2012). Controlling access to pick-up and delivery vans: the cost of alternative measures. European Journal on Criminal Policy and Research, 18(2), 163-182.

[/s2If]

Estimating the Operational Impact of Container Inspections at International Ports (Bakshi et al. 2011)

Summary

The US government is pushing a new 100 % screening regime for US-bound containers in foreign ports to mitigate the risk of weapons of mass destruction entering US soil. The 100 % regime, however, is a major concern for foreign port operators because the current Container Security Initiative (CSI) regime seems not to be scalable for high inspection rates. The paper of Bakshi et al. (2011) simulate impacts of two container inspection regimes (the CSI and a new one) in terms of port congestion, handling cost and dwell time. To carry out the simulation, the authors use discrete event queuing network simulation with real container movement data from two of the world’s busiest container terminals. The analysis shows that cargo inspections many times disrupt optimized logistics processes at seaports. In particular, inspections extend the transportation leadtime because shipments lose time as they (i) are moved to an inspection site, (ii) queue for inspection to start, (iii) pass inspections themselves. Download the abstract here: http://pubsonline.informs.org.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

This paper is highly relevant for CORE demonstrations that involve screening in seaports (WP10-11 and WP13-15 and WP17). The research illustrates the impact of the security integration on speed, cost, and predictability of the seaport logistics. Bakshi et al. (2011) observe that security inspection at port entrances (quayside for ships and city-side for trucks) with drive-through inspection portals, does not delay nor divert the routine container handling process, in which a crane unloads a container from a ship or a truck and deposits it to a stack where the container waits until it is its time to leave the port. But if a container is inspected a few hours prior its scheduled departure, as is currently done under the US Container Security Initiative (CSI) regime, the routine handling process gets disrupted, (see Figure 6). Remarkably, the only value-adding security activity “non-intrusive inspection” (11) requires three preceding activities (8P10) and another three following activities (12-14), none of which add value from security or service standpoints. Other valueless activities, which do not appear in the illustration, include searching of the shipment selected for screening and verification of its documentation. The extra activities consume time and money but add no value to the shipping service. The first approach with drive-through portals eliminates the non-value adding supportive logistics activities (8-10 and 12-14) and therefore enhances logistics speed and efficiency without necessarily lowering the security level.


coreobservatory30062016

 

Reference

Bakshi, N., Flynn, S. E., & Gans, N. (2011). Estimating the operational impact of container inspections at international ports. Management Science, 57(1), 1-20.

[/s2If]

Supply chain security orientation: conceptual development and a proposed framework (Autry and Bobbit 2008)

Summary

Even though supply chain security has become an increasingly important managerial domain, there is little understanding about what security aware firms are, what enables and drives security awareness, and what are the outcomes of supply chain security (SCS) orientation. Autry and Bobbit (2008) set out conceptualize, validate and operationalize the construct of SCS orientation. Based on 31 interviews with US-based managers, they conclude that SCS orientation comprises four general categories of security solutions: security preparation and planning, security-related partnerships, organizational adaptation and security-dedicated communications and technology. The authors write that these security solutions “could result in supply chain risk management-related efficiencies, such as decreased lead times to customers, greater product reliability, waste reduction, and increased delivery reliability, due to the lessened need for operations workers to perform security-related tasks such as redundant container checking, securing shipments, or other similar tasks.” The abstract is available at: http://www.emeraldinsight.com.

Review by Toni Männistö (CBRA) based on his doctoral thesis.

[s2If is_user_logged_in()]

Full review

The CORE demonstrators could a learn lesson from the research paper of Autry and Bobbit (2008) that organizational commitment to security plays a critical role in the fight against supply chain crime. Ideas and findings of the research paper also contribute to the development of the CORE educational and training material (WP19). The article shows that top management support, employee security attitudes, employee integrity/loyalty are key internal factors that strengthen the SCS orientation. External contributing factors include political political/legal factors/support, partner cooperation, and partner support. Strong SCS orientation is expected to translate into higher business performance, customer satisfaction and supply chain chain continuity.

Reference

Autry, C.W. & Bobbitt, L.M., 2008. Supply chain security orientation: conceptual development and a proposed framework. The International Journal of Logistics Management, 19(1), pp.42–64.

[/s2If]

MARITIME SECURITY – DHS Progress and Challenges in Key Areas of Port Security, GAO, July 2010 (CORE1064)

Summary: This GAO report analyses the progress the US Department of Homeland Security (DHS) has made in maritime supply chain security over the past five to ten years. The report raises problems that the DHS and its component agencies – the Coast Guard and the Customs and Border Protection (CBP) – have encountered regarding improvement of risk management, reduction of the vulnerability to threats of small vessels, implementation of security assessment in foreign ports, and the overall progress in supply chain security.  The report states that so far the Coast Guard has carried out risk assessments, but their results do not allow effective comparison and prioritization of risks across ports. The Coast guard has also identified points of vulnerability related to waterside attacks by small vessels, reached out to the general public to encourage recreational sailors to report anomalies, started tracking of small vessel, tested equipment to screen small vessels for nuclear material and conducted security maneuvers such as vessel escorts. Nevertheless, resource constraints and technical problems prevent the Coast Guard to protect the US coastline and maritime infrastructure from small-vessel threats effectively. Moreover, the Coast Guard has been assessing security in foreign ports, but the lack of the agency’s resources and certain countries’ reluctance to collaborate with the US authorities have slowed down the global security assessment. Finally, as for the general supply chain security, the DHS has been running the Secure Freight Initiative (SFI) in foreign ports to test the feasibility of the 100% scanning of US-bound shipping containers with non-intrusive inspection (NII) technologies and radiation detection equipment. The findings of the SFI pilots indicate that the 100% scanning is not a feasible policy because it would disrupt port logistics, damage international trade and raise healthy concerns, among other things. The report is available for download at: www.gao.gov/assets/660/659087.pdf.

[s2If is_user_logged_in()]

Full review: This GAO review concentrates on the US maritime supply chain security. The document provides important information for people who are working for the CORE demonstrations of WP1 and WP14 because these demos involve maritime transportation into and from the US mainland. Those demonstrations that test tracking & tracking solutions might benefit from the document’s update on small-vessel identification and tracking systems.

Cross-references:

  • Coast Guard: Deployable Operations Group Achieving Organizational Benefits, but Challenges Remain. GAO-10-433R. Washington, D.C.: April 7, 2010.
  • Supply Chain Security: Feasibility and Cost-Benefit Analysis Would Assist DHS and Congress in Assessing and Implementing the Requirement to Scan 100 Percent of U.S.-Bound Containers. GAO-10-12. Washington, D.C.: October 30, 2009.
  • Maritime Security: The SAFE Port Act: Status and Implementation One Year Later. GAO-08-126T. Washington, D.C.: October 30, 2007.
  • Maritime Security: Vessel Tracking Systems Provide Key Information, but the Need for Duplicate Data Should Be Reviewed. GAO-09-337. Washington, D.C.: March 17, 2009.
  • Supply Chain Security: Challenges to Scanning 100 Percent of U.S.-Bound Cargo Containers. GAO-08-533T. Washington, D.C., June 12, 2008.

Additional keywords: Maritime security, supply chain security, 100% scanning and track & trace

 

CORE1064

[/s2If]