Академический Документы
Профессиональный Документы
Культура Документы
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at http://www.jstor.org/page/
info/about/policies/terms.jsp
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide range of content
in a trusted digital archive. We use information technology and tools to increase productivity and facilitate new forms of scholarship.
For more information about JSTOR, please contact support@jstor.org.
Penn State University Press is collaborating with JSTOR to digitize, preserve and extend access to Transportation Journal.
http://www.jstor.org
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
RAVI SARATHY
Security
and
the Global
Supply
Chain
Abstract
This article examines implications for global supply chains posed by security threats in the
U.S. and elsewhere, and identifies actions for addressing those threats. The principal goal is to
design security into the supply chain rather than seek tomitigate consequences after thefact.
Redesigning supply chains to make them robust and resilient can help avoid and mitigate the
impact of disruptions, whether from security breaches or other causes. Such efforts require
collaborations with partners across the supply chains and with governments. The short-term
costs of such security measures can be balanced against the long-term gains from improved
supply chain performance and improved customer relations.
r.sarathy@neu.edu.
This article originated as a paper presented at a
Trade and Logistics,
conference on "International
Corporate Strategies and the Global Economy,"
University of Le Havre, September 2005. The paper was
further developed while the author was on sabbatical as
a visiting professor at the Australian Graduate School
AGSM, Sydney, Australia. Final
ofManagement,
herein benefited from
refinement for publication
constructive criticism by three anonymous reviewers.
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
ANDGLOBALSUPPLYCHAIN 29
2006 SECURITY
Model
systems, people
manufacturing
employed
across the supply chain, and information tech
nology.
task is to design the overall
Management's
supply chain across the three subsystems, to be
consistent with its overall strategic objectives,
and then to configure how various tasks, pro
cesses, physical facilities and infrastructure,
means of transportation, human resources, and
product and information flow will be aligned
across the supply chain, while complying with
government regulations. This approach is dem
onstrated in Table 1. This generalized model
has several implications for coping with disrup
tions, including security-related disruptions:
For smooth functioning of the supply
chain,management would have to ensure
that all components of the supply
chain?tasks,
physical
goods flow,
transportation, informationflow, people,
etc.?are
deployed effectively and as
planned. Disruptions, whether security
levelalongthesupplychain,at thefacili
customers.
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
30
1. A Generalized
Table
TRANSPORTATION
Model
.
,
Supply Chain -> Dispersion:
Supply chain I elements:
Strategicobjectives
Tasks
JOURNAL
of the Supply
Chain_
, Supplier Customer
Relationship
Management
Fall
InternalSupply Relationship
Chain Management
Management
Processes
Manufacturing facilities
Transportation
facilities
modes
Transportation
flow
Information
resources
Human
Government
regulation/relations
and
can
cause
severe
consequences.
locations
and functional
groups
disruptions.
Lee and Whang
(2005) point to some of
the consequences of supply chain disruptions
(whether caused by security-related causes or
other reasons), including increased cost; deliv
ery disruption; interruptions in the smooth flow
of product and service; time delays; uncertainty
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
2006
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
32
TRANSPORTATION
(Koch 2005).
JOURNAL
Fall
Layered
Security: An Approach
Mitigating SecurityRisk
to
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
2006
33
Supply chain
facilities:
Warehouses
<-.i
stations
en route
?
3
Onward transit in
Borders and destination ports
importingcountry,
to customers
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
34
TRANSPORTATION
Figure
2. Layered
sources:
Goods:
Security Measures:
nodes
and
Transportation
carriers
Fall
Security
Manufacturing
JOURNAL
security
devices,
sensors
Portals
at ports
for screening
containers;
Monitoring people
(With access to goods, containers,
carriers,ports)
Establishing trust
Information flow
C-TPAT:
Terrorism:
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
2006
ofRFID tags
2005,Weis 2003). If theintegrity
- The Container
Security Initiative (CSI),
which, with the cooperation of over forty
of theworld's largest ports, helps identify
dangerous containers before they leave the
ports for theU.S. and elsewhere. CSI can
reduce overall delays, as container screen
ing can occur at the overseas ports, while
awaiting loading, during down time.CSFs
intent is to cooperate with local port offi
cials to establish trustedcategories of ship
pers and theirnetworks (importer, shipper,
freight forwarder, land transportation,
dock workers, exporter, manufacturer,
etc.). Further, local officials can help iden
tifywhich of the shippers unfamiliar to
CBP are low-risk operators, helping make
the system efficient. The challenge is to
help supply chain partners?shippers,
freight forwarders, and third-party (3PL)
security param
logistics providers?meet
eters, with levels of knowledge and com
mitment equivalent to the shipper. CSI re
quires thatCBP personnel be stationed at
the various foreign ports that are part of
the CSI. These U.S. staffmembers have
to communicate with and cooperate with
local port officials and with local govern
ment regulations in order to be effective.
- Customs Trade
Partnership against Terror
ism, C-TPAT, is a public-private partner
ship, which gives participants expedited
cargo processing in exchange for tightened
security and cargo tracking at points along
the cargo transitand supply chain. Partici
pant firms receive security recommenda
tions from CBP (CBP 2005) and are re
quired to work with their supply chain
partners to implement these security best
practices. CBP officials review their secu
rity procedures, make recommendations
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
36
TRANSPORTATION
JOURNAL
Fall
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
2006
- Use
of RFID
tags for monitoring what
is loaded onto the containers as well as
monitoring containers and their contents
during transit; leading to "smart boxes,"
containers equipped with RFID and com
plementary advanced container security
devices that can provide greater in-transit
security of containers;
Non-intrusive inspection of suspect con
tainers, at departure and at arrival;
"Supply chain intelligence"
keeping a
record of who has had access to the con
tainer at warehouses, at the dock, at load
ing and unloading, and in transit; as well
as continuously recording the physical lo
cations of containers and individual items;
- Communication
among
transportation
modes, containers, and supply chain net
works, linked to supply chain database
management, with use of encryption and
data security.
Three aspects of technology aids to security,
namely, theuse of RFID tags, smart containers,
and container screening and inspection, are dis
cussed in greater detail (David 2005; Tirsch
well 2005a; Tirschwell 2005b; McHale
2005;
Eisenberg
2005).
RFID Tags
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
38
TRANSPORTATION
JOURNAL
Fall
on
tag's
content
when
broad
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
2006
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
40
TRANSPORTATION
Strategy:
JOURNAL
Fall
A Robust SupplyChain
maintaining
strategic stocks, using
modes
of
multiple
transportation, and postpon
ing product differentiation to downstream
stages. Hendricks and Singhal (2005a, 2005b)
list additional measures
that can create ro
bustness, such as standardizing product design,
using flexible contracts, using spot markets,
and contracting for flexible capacity, with some
of this capacity set aside as reserve or reactive
capacity.
Metrics
Firms need metrics tomeasure supply chain
vulnerability and robustness (Trent and Monc
zka 2005). Measurements can help analyze the
root causes of supply chain disruptions and
suggest corrective actions thatcan improve and
control the supply chain processes. Without
soundmetrics, firms cannot assess, control, and
improve supply chain performance. Periodic
reporting and auditing of supply chain perform
ance, focusing on metrics that address security
and robustness, along with general supply
chain efficiency measures, can facilitate pre
ventive and corrective actions before serious
failure occurs. Technology can facilitate the
development of suchmeasures, such as through
the use of RFID in gathering real-time supply
chain information, or by using identification
based controlled secure entry to factories and
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
2006
41
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
42
TRANSPORTATION
JOURNAL
Fall
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
2006
43
measures.
security initiatives
Supply-chain-focused
can also yield market benefits. For example,
RFID tags can continuously monitor demand
and thus allow the firm to adjust production
quantities, order components, and route fin
ished goods to end-user markets with the great
est unfulfilled demand. This can enhance cus
tomer satisfaction, result in repeat business and
customer retention, and ultimately enhance
overall profitability. Additionally, integration
of supply chain information with the broader
manufacturing operations and marketing data
bases can help automate customer receipt of
goods and promote faster payment of receiv
ables, lowering working capital needs. Table
2 summarizes the costs and benefits of security
oriented supply chain enhancements, consider
ing their impact on both supply chain efficiency
and effectiveness.
Costs. Some security costs are likely to be
unavoidable.
Governments
may mandate
threshold levels of cargo security, and govern
mental agencies in charge of security, such as
DHS, might promulgate new fees to pay for
security costs. Regulations from entities such
as CBP could increase the adoption of con
tainer sealing and motivate increased participa
tion inCSI and C-TPAT initiatives. For exam
ple, passive container seals could become
mandatory on all maritime containers. Passive
tags would be relatively inexpensive, costing
about $0.40 to $0.50 each, while the active
tag system might cost $70 to $100 per unit,
depending on features such as memory, com
munication capabilities, ability to read and re
ceive and transmit data from different sources
and sensors, andmulti-band and multi-standard
transmission.
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
Table
2. Costs
Effect on:
Costs/
negative
impacts
deter
may
necessary investments
-
Time
to implement
Additional
hiring
Multiple
standards
security-related
cycle time
stretching out delivery
constrained
Supply chain partner choices
of
costs
Higher
emergency
across
partners and
still under development
of deliberate
inventory,
reserve
Increased
Enhancements
Supply Chain
security processes
cost of security-related
personnel
as solutions
countries,
approval
Fall
JOURNAL
TRANSPORTATION
44
redundancy,
databases
and marketing
manufacturing
on to users
costs passed
Security-related
in the form of incremental user fees
-Cost and
complexityof compliance with
security measures
government-mandated
and regulations
Under-investment
capacity
in security
due
to
difficultyof quantifyingtheirlong-term
Benefits/
positive
impacts
Enhances
security
-Reduced
pipeline and bufferstock inventories
due to better information
-Better
shipmenttracking
-
Reduced
Reduced
pilferage
out-of-stock
states
benefits
Enhanced
customer
concerns
to
"green
lane"
availability
of accurate
and
timely metrics
manufacturing
due
service,
schedules
and quantities
between Robustness
and
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
2006
for Action
Suggestions
We now conclude with suggestions for ac
tion that flow from our discussion of supply
chain security issues. Table 3 sets out the prin
cipal areas for strategic focus and action, and
also highlights challenges that firms face in
each of these areas.
across the Supply Chain
Collaborating
chains
involve several entities, in
Supply
the
its
firm,
cluding
industrypartners, govern
ments, and supply chain intermediaries. A key
task is assigning roles and responsibilities for
each of the major actors, and then ensuring
collaboration to jointly strengthen security.
Governments aremore concerned with borders
and infrastructure facilities, while it is appro
priate that the firm focus on goods, itspartners,
and employees. Improving global supply chain
security is a long-term effort requiring govern
ment - business partnership. Corporations can
participate in a dialog with government depart
ments and officials from theU.S., other coun
tries, and multilateral organizations, in estab
lishing threshold levels of desired security and
shaping and implementing regulations related
to trade and shipping security. The firmwill
benefit from the convergence of security regu
lations and practices across countries. It should
focus on encouraging such convergence of se
curitymeasures across countries, which is no
trivial task, as nations attempt to balance secu
rity with other considerations. For example,
when U.S. Customs designated some European
ConfiguringtheSupply Chain:
Robustness, Resilience
Security should now be an integral part of
supply chain management. This means think
ing about security not only during the transpor
tation phase, but also in choice of supply chain
partners, in locations to source from, locations
tomanufacture in, and countries tomarket to.
Security-linked supply chain interruption and
breakdown can have cascading effects on in
ventory levels, manufacturing ability and vol
ume, and product development and availabil
ity. The longer and more stretched out the
supply chains, themore interruptionsare likely,
not only because of terrorism,but also due to
other events such as port strikes.
However, redesigning the supply chain to
make itmore robust through developing re
serve capacity, gaining
additional
slack
or
increased
levels
addi
through
inventory
tional scheduled cycle time, creating deliberate
redundancy, or redesigning new product devel
opment to gain greater flexibility can also pay
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
Table
Areas
Focus
Strategic
with
Collaborating
across
Strategie Areas
Working
the insurance
the supply
chain
governments,
for Action
industry consortia,
standards,
time.
industry,
and multilateral
of borders,
balancing
and
people,
alternatives
for reserve
geographic
reach.
and auditing
of labor. Assessing
security readiness.
with
supply chain
Establishing
trusted partner profiles. Moving
towards shared technologies,
information, and best practices.
partners
screening,
Assessing,
Harnessing
technology
and
technologies
security,
early warning
Developing
Cost-benefit
Developing
short-term
analysis
security
awareness,
organization
Developing
of
for
scenario
Organizing
an emergency
crisis
planning,
for security,
simulation.
society,
Security,
and corporate
the economic
impact
capital
of security
on local,
disruptions
economy.
regional, and national
other consequences?
Analyzing
related
personnel
impacts,
standards.
on field performance.
of security-based
consequences
disruptions,
tradeoffs,
value of
analyzing
incremental
and
redundancy.
a culture
Developing
of security.
engagement
function,
Understandingand helpingmitigate
social responsibility
in
focus.
Establishing
determiningthe level of
human
decentralization,
needs, and training.
and common
estimating
robustness
plan, appointing
preparedness
chief security officer. Conducting
security
industry consortia
qualitative
long-term benefits from
secure and robust supply chains, vs.
their short-term costs.
systems.
cost
disruptions. Negotiating
sharing with partners and
readiness,
and
Estimating quantitativeand
and
Internal
providers
specialists.
Driving technologyimprovements
estimates
dependable
costs and long-term
governments.
as security
based
security-specific
Developing
metrics.
overall performance
and models
providers
features,
container
shared
Planning
investments.
technology
Supply chain
and enhancing
partners'
and ability to enhance
partners, countries,
security. Which
most effective in strengthening
Addressing
motivation
influencingtechnologydirections,
screening.
metrics
to robustness.
ranking
container
add
securityprotection?Role of 3PL
security-relevant
and their broader
competing
most
alternatives.
design
capacity,
Cooperative
Understandingwhich security
measures
robustness,
resilience
strategies
and efficiency
robustness
over
particularly
Configuring the
supply chain:
to be raised
likely
facilities,
factories,
ports, goods,
information flow.
for Action
Challenges
Establishing thresholdsecurity
Determining
organizations.
roles and responsibility
respective
for security
Fall
JOURNAL
TRANSPORTATION
46
safety, environment
and legal liability.
partners
for foreign
particularly
and countries;
ongoing
group.
working
with local governments,
Working
in
first responders,
legislators
establishingjoint securityprograms,
roles
and demarcating
responsibilities.
and
Pushing
for cost
benefitanalysis in establishingnew
regulations
and programs.
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
2006
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
48
TRANSPORTATION
JOURNAL
Fall
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
2006
References
A T Kearney, "Smart Boxes,"
2005.
Chicago,
'
'The impact of port and trade security
Banomyong, R.,
initiatives on maritime
supply-chain
management,"
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
50
Maritime
Policy
pp. 3-13.
& Management,
TRANSPORTATION
Jan.-Mar.
32(1),
2005,
Chopra, Sunil
to Avoid
Risk
of US
perceptions
sourcing
International Marketing
Review,
and Manmohan
18(5), 2001,pp.542-561.
S. Sodhi, "Managing
Sloan
Breakdown,"
Supply-Chain
Review, Fall 2004, pp. 53-61.
Management
"Editorial:
Mark,
David,
High-tech
tracking tools
secure incoming cargo," Electronic
Feb.
17,
Design,
2005.
of Defense, Final Regulatory Flexibility
Radio
of Passive
Frequency
Identification
2005. Undersecretary
of Defense
for
Aug.
Department
Analysis
(RFID).
Acquisition
Technology & Logistics.
A
"The
Core
Dobie,
Kathryn,
Shipper Concept:
Proactive
for Motor
Carriers,"
Strategy
Freight
Journal, Spring 2005, pp. 37-53.
Transportation
DOT. Volpe National Transportation
Systems Center,
for Speed,"
R. G., "A Need
Journal of
Aug. 4-10, 2003.
R. G., "Creating
the Smart Container,"
Edmonson,
Journal of Commerce, Dec.
13, 2004.
containers' electronic sensor
Eisenberg, Anne, "Cargo
"
New York Times, Jan. 20, 2005.
says 'do not disturb,'
Edmonson,
Commerce,
Cards,"
Far
Eastern
Economic
Review,
January/
February 2006.
and
and Heejoon
"Borders
Fratianni, M.
Kang,
International Terrorism," Working Paper, Kelley School
of Business,
Indiana University, May 2004.
GAO,
of Key Customs
Security: Expansion
to Critical
Greater Attention
Require
"Container
Programs Will
Success
Factors,"
General Accounting
DC:
Washington,
July 2003.
Security. Summary Of Challenges
GAO-03-770,
Office,
"Homeland
GAO,
For
In Targeting Oceangoing
Faced
Cargo Containers
DC: General
04-557T, Washington,
Inspection," GAO
Accounting Office, March 31 2004.
"Defense
GCN,
taps Alien
Government
Computer News,
for RFID
May
technology,"
12, 2005.
http://
www.gcn.com/online/voll_nol/35785-l.html.
Jim Weinberg,
and Don
Gerencser, Mark,
"Port Security War Games:
Implications
Chain,"
2002, Booz Allen Hamilton.
forU.S.
Vincent,
Supply
JOURNAL
Hathcote,
Fall
I. Nam,
J. and
of sourcing
"Advantages
S Korea
and Mexico,"
1999, pp.
13(2), Summer
Kevin
B.
and Vinod
R.
Singhal,
"An
on Long-Run
Stock Price Performance
and
Disruptions
and Operations
Equity Risk of the Firm," Production
14(1), Spring 2005, pp. 35-52.
Management,
Hendricks,
"Association
B.
Kevin
between
and
Vinod
Supply
Chain
R.
Singhal,
Glitches
and
Performance,"
Science,
51(5),
Management
Operating
May 2005, pp. 695-711.
Juels, Ari, "Attack on a Cryptographic RFID Device,"
RFID Journal, Feb. 28, 2005.
Trades
Koch,
Christopher,
speech at the Maritime
Department,
22, 2005.
AFL-CIO
2005
Convention,
Chicago,
July
Disruption
pp. 17-27.
"An Evaluation
of Logistics Services'
Lu, Chin-Shan,
of International Distribution
in
Centers
Requirements
2002,
Taiwan,"
feb/integlnfra2. asp
but Dollar Foolish Charles,
Massey,
"Penny Wise
The Facts Behind Sensors-in-the-Box,"
paper presented
at the Maritime
Port and Cargo Security Summit, Jan.
26, 2005.
turns to high
John, "DHS
and Space Electronics,
McHale,
tech to control
borders," Military
22-26.
Evil,"
115.
Washington,
Neal, G.
security," Journal
2005, pp. 201-217.
O'Hanlon,
Homeland,"
Institution.
of Conflict
Michael,
2002,
Container
"IDS
models
Resolution,
"Protecting
Washington,
Terrorism,"
of airline
49(2),
the
DC:
April
American
Brookings
a
Rice, James B. Jr. and Frederico Caniato, "Building
Secure and Resilient
Supply Network,"
Supply Chain
Management
Review,
Sept./Oct.
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions
2006
Economy
International
Journal
of
supply chain disruptions,"
and Applications,
9(1), March 2006,
Logistics: Research
pp. 33^5.
51
for container
Tirschwell,
Peter, "An
opportunity
Journal of Commerce, Feb. 7, 2005a.
and container security,"
Tirschwell,
Peter, "Nukes
Journal of Commerce, March 28, 2005b.
Tirschwell,
Peter, "Should
security start inside the
seals,"
box?,"
Journal
Trent, Robert
"Pursuing
global
through
advantage
integrated
Review, May 2002,
sourcing," Academy ofManagement
16(2), pp. 66-80.
Trent, Robert J. and Robert M. Monczka,
"Achieving
in Global
Excellence
Sloan Management
Sourcing,"
competitive
Transport,
2003, New
Frequency
computer
and Privacy
Stephen A., "Security
masters
Identification Devices,"
in Radio
thesis
in
and
science, Dept. of Electrical Engineering
Computer Science, MIT, May 2003.
of
Zsidisin,
A.,
George
"Managerial
Perceptions
Supply Risk,'' The Journal of Supply Chain Management,
Winter
2003, pp.
14-25.
This content downloaded from 103.27.8.45 on Tue, 20 Oct 2015 16:53:20 UTC
All use subject to JSTOR Terms and Conditions