Transaction Search Form: please type in any of the fields below.
Date: November 22, 2024 Fri
Time: 11:54 am
Time: 11:54 am
Results for supply chain security
5 results foundAuthor: Ekwall, Daniel Title: Managing the Risk for Antagonistic Threats against the Transport Network Summary: The World Trade Centre terror attack in 2001 changed the world and with it the conditions for logistics worldwide. The aftermath of the attack brought needed attention to the vulnerability of modern supply chains. This thesis addresses the antagonistic threats that exploit the vulnerability in a supply chain. Antagonistic threats are a limited array of risks and uncertainties and can be addressed with risk management tools and strategies. There are three key demarcations between antagonistic threats and other risks and uncertainties: deliberate (caused), illegal (defined by law), and hostile (negative impact, in this thesis, for transport network activities). This thesis makes a theoretical contribution to the usage of theories from criminology in supply chain risk management to handle antagonistic threats against the transport network. The recognition that antagonistic threats toward the transport network are a problem leads to verification of the research questions from the background and the theoretical framework. This is done to place or relate the research questions closer to the context. Furthermore, it leads to the conclusion that the answers may or may not contain competing and/or incompatible parts which differ depending on the perspective or viewpoint at the moment. One of the most important things to understand is that antagonistic threats toward freight always have been a feature in both business and politics. The different functions and goals for all stakeholders mean that all stakeholders and actors may use similar methods to manage antagonistic threats but the effects and consequences will change according to the circumstances. The system approach in this thesis is a soft-system thinking where reality is described in subjective terms and the whole system has the distinctive trait of vague or undefined boundaries between system components and the surrounding environment. Therefore, this thesis uses a complex system approach in which paradoxes and bounded rationality describes the system’s behaviour. This thesis defines the legal descriptions and criminal threats against and within supply chain management activities that entail both the systems context and boundaries. Managing of the antagonistic threats through the risk management perspective is separated into two sides, pre-event and post-event measures, which means the system needs to be robust and resilient, using logistics terms. It should be robust to automatically handle small risks (normally with high likelihood and low impact). The system also needs resilience in order to adapt, improvise, and overcome any disturbance greater than the system’s robustness can handle. Both robustness and its resilience can constitute of the full range of prevention, mitigation, and transferring tools and methods. Regardless of which perspective or viewpoint is chosen for analysing the problem, the same basic set of tools and methods are valid, but in practical use they need to be adapted to the actors’ needs and wants for managing their exposure to antagonistic threats. Details: Göteborg : Chalmers University of Technology, 2009. 286p. Source: Internet Resource: Doctoral Thesis: Accessed May 11, 2011 at: http://bada.hb.se/handle/2320/5033 Year: 2009 Country: International URL: http://bada.hb.se/handle/2320/5033 Shelf Number: 121713 Keywords: Cargo TheftFreightRisk ManagementSupply Chain SecurityTransport Security |
Author: U.S. Government Accountability Office Title: Supply Chain Security: CBP Needs to Conduct Regular Assessments of Its Cargo Targeting System Summary: The U.S. economy is dependent on the expeditious flow of millions of tons of cargo each day. Cargo containers are an important instrument of global trade but also can present security concerns. CBP is responsible for administering container security programs, and its strategy for securing maritime cargo containers includes analyzing information to identify shipments that may contain terrorist weapons or other contraband. Because CBP has insufficient resources to examine every container, targeters use ATS to target which container shipments should be examined. GAO was asked to assess CBP's targeting efforts. This report addresses (1) how ATS supports CBP's targeting of maritime cargo container shipments for national security purposes and (2) the extent to which CBP assesses the effectiveness of ATS's national security targeting rules. GAO analyzed fiscal year 2011 CBP data on shipments and containers arriving at U.S. ports and containers scanned at these ports. GAO also visited six CBP units selected on the basis of the percentage of maritime shipments that were scored as high risk or medium risk for national security purposes at these locations in fiscal year 2011, among other factors. GAO also analyzed documents, such as CBP's ATS performance measures. What GAO Recommends GAO recommends that CBP (1) ensure that future updates to the weight set are based on assessments of its performance and (2) establish targets for performance measures and use those measures to regularly assess effectiveness of the weight set. DHS concurred with these recommendations. Details: Washington, DC: GAO, 2012. 46p. Source: Internet Resource: GAO-13-9: Accessed November 29, 2012 at: http://www.gao.gov/assets/650/649695.pdf Year: 2012 Country: United States URL: http://www.gao.gov/assets/650/649695.pdf Shelf Number: 127035 Keywords: Cargo SecurityMaritime CrimeMaritime SecuritySupply Chain Security |
Author: Schouwstra, Robert Title: Strengthening the security and Integrity of the Precious Metals Supply Chain Summary: In its resolution 2013/38 entitled "Combating transnational organized crime and its possible links to illicit trafficking in precious metals," the Economic and Social Council calls upon the United Nations Interregional Crime and Justice Research Institute (UNICRI) to conduct a comprehensive study on the possible links between transnational organized crime, other criminal activities and illicit trafficking in precious metals. UNICRI has developed a programme to promote an international strategy to combat illicit trafficking in precious metals, in which the comprehensive study requested in ECOSOC resolution 2013/38 is the major component of an Assessment Phase to be followed by an Operational Phase. An Expert Meeting on "Promoting an international strategy to combat illicit trafficking in precious metals," organised by UNICRI in September 2015 in Turin (Italy), allowed the collection of experts' views on the issues and challenges that needed to be addressed and emphasized in the study. The present technical report aims at giving a comprehensive overview of the current trends related to precious metals trafficking, in particular it focuses on the precious metals supply chain, the different threats and challenges hanging over this market - including the involvement of organised crime groups and associated criminal activities - as well as the regulatory frameworks and initiatives in place to guarantee the integrity of the supply chain. The knowledge acquired throughout this report is used to identify the strengths, weaknesses, opportunities and threats to address the challenges. A series of recommendations concerning the implementation of an international strategy to prevent and combat illicit trafficking in precious metals are included in the assessment. The report is intended to address the following research questions and sub-questions: - What is the extent of illicit trafficking in precious metals? - Is illicit trafficking in precious metals linked to transnational organized crime and other associated criminal activities? - Is illicit trafficking in precious metals linked to terrorist activities? - What are the vulnerabilities of the precious metals supply chain? - How can illicit trafficking in precious metals be prevented and countered? - What are the strengths and weaknesses of existing initiatives? Details: Torino - Italy: United Nations Interregional Crime and Justice Research Institute (UNICRI), 2016. 123p. Source: Internet Resource: Accessed May 6, 2017 at: http://files.unicri.it/PM_draft_onlinev.pdf Year: 2016 Country: International URL: http://files.unicri.it/PM_draft_onlinev.pdf Shelf Number: 145328 Keywords: Illicit TraffickingNatural ResourcesOrganized CrimePrecious MetalsSupply Chain SecuritySupply ChainsTerrorismTrafficking in Metals |
Author: Ekwall, Daniel Title: Value and incident categories for cargo theft in Europe: Analysing TAPA EMEA statistics Summary: Purpose of this paper To analysis the relationship between value (reported stolen value) and different incident categories in order to find patterns and trends in cargo theft within Europe. Design/methodology/approach The research is explorative as this type of research is missing in logistics but also deductive as it utilizes theories from criminology. The analysis is based on TAPA EMEA's IIS transport related crime database. The result is analyzed and discussed within a frame of reference consisting of theories from logistics and criminology. Findings There are seasonal variations of incident categories. This variation is found both between months of the year and the day of the week for many of the incident categories, but the patterns are different for different incident categories. Within this understanding there are many changes in hot spots, modus operandi, theft endangered objects and handling methods during time, but the basic theoretical frame of reference is still more or less the same. Research limitations/implications The research is based on theories deduced from criminology and logistics together with secondary data regarding cargo theft. The geographically limitation to the Europe is done of practical reasons whiles the frame of reference can be used globally for analysis antagonistic threats against transports. Practical implications This research is limited by the content and classification within the TAPA EMEA IIS database. Nevertheless, this database is the best available database and the reports comes mainly from the industry itself, represented by the different TAPA members how report their losses anonymous, nevertheless the quality of the data limits the possibility to make normative statements about cargo theft prevention. What is original/value of paper This paper is the first within supply chain risk management that utilizes actual crime statistics reported by the industry itself, in order to analyze the occurrence of cargo theft by focusing on the value of the stolen vehicle/goods in relation with incident categories. Details: Conference paper, 2012. 17p. Source: Internet Resource: Accessed July 14, 2018 at: http://www.diva-portal.org/smash/get/diva2:887489/FULLTEXT01.pdf Year: 2012 Country: Europe URL: http://www.diva-portal.org/smash/get/diva2:887489/FULLTEXT01.pdf Shelf Number: 150871 Keywords: Cargo TheftFreight IndustryRisk ManagementStolen GoodsStolen PropertySupply Chain SecurityTheft of GoodsTransport Security |
Author: Beck, Adrian Title: Emerging Technology in Loss Prevention Retailing: Benchmarking the Loss Prevention Industry Summary: Context - This is the second in a series of benchmarking surveys focussing on issues that are of particular interest to the retail loss prevention industry. - This study looks at the issue of emerging technologies and their use in the retail loss prevention arena. It presents data on the perceived value of nine technologies, the extent to which they are currently being used, and the primary problem they are considered to address. The study also collected data about how the loss prevention technology industry is perceived by loss prevention practitioners. - The survey sample represents $1.576 trillion in US retail sales (48% of the market) with a total of 123,333 stores. Findings - Exception-based Video Alerting was regarded as the technology with the highest potential, followed by GPS Product Tracking and then RFID. - Respondents were much less convinced about the potential impact or signifcance of Body-mounted Cameras and Biometric Technologies. - The technologies most in use or being piloted were GPS Product Tracking (46%), Exception-based Video Alerting systems (41%) and RFID (32%). - No retailers responding to this survey said they were currently using Body-mounted Cameras although two were planning to use them in the near future. - Exception-based video alerting, non-scan POS detection and Smart Shelves were the top three emerging technologies that respondents were planning to use in the near future. - Retailers selling apparel were more likely to be using or planning to use RFID. - Retailers selling food were more likely to be using or planning to use Non-scan Activation technologies and Smart Shelf technologies. - For those using or planning to use Feature Recognition and Smart Shelf technologies, they were seen by the majority of respondents as being important in responding to ORC. - A sizable minority of respondents (31%) also regarded Smart Shelves as being useful for inventory control. - RFID was primarily seen as a technology for helping with inventory control (81%). - Both Exception-based Video Alerts and Non-scan POS Detection were primarily seen as tools to help tackle internal theft. - Body-mounted Cameras were viewed as a tool almost exclusively to help with issues of safety and security. - Biometrics was largely seen as a technology to be used to target internal theft and safety/security issues. - Most respondents viewed the Loss Prevention Technology Industry's performance as being adequate (48%), with a signifcant percentage considering that they had been either successful or very successful (37%). Details: London, UK: LPM, 2017. 13p. Source: Internet Resource: Accessed January 21, 2019 at: http://www.jard.me/source/brochure/16_1509469871.pdf Year: 2017 Country: United Kingdom URL: https://losspreventionmedia.com/loss-prevention-magazine/m-benchmarking/understanding-data-analytics-loss-prevention/ Shelf Number: 154325 Keywords: BenchmarkingBiometric TechnologiesBody CamerasLoss PreventionRetail Loss PreventionSupply Chain SecurityTechnologiesVideo Cameras |