Your browser does not support JavaScript!
http://iet.metastore.ingenta.com
1887

Enhancing supply chain security with vulnerability management and new technology

Enhancing supply chain security with vulnerability management and new technology

For access to this article, please select a purchase option:

Buy article PDF
£12.50
(plus tax if applicable)
Buy Knowledge Pack
10 articles for £75.00
(plus taxes if applicable)

IET members benefit from discounts to all IET publications and free access to E&T Magazine. If you are an IET member, log in to your account and the discounts will automatically be applied.

Learn more about IET membership 

Recommend Title Publication to library

You must fill out fields marked with: *

Librarian details
Name:*
Email:*
Your details
Name:*
Email:*
Department:*
Why are you recommending this title?
Select reason:
 
 
 
 
 
IET Intelligent Transport Systems — Recommend this title to your library

Thank you

Your recommendation has been sent to your librarian.

This study discusses risk management tools and the mobile enterprise factory innovation process as a motor for security enhancement using new technological solutions. New technologies provide opportunities for increasing the overall security and safety of shipments by proactive supply chain risk management and introduction of powerful security solutions. Concept development methods, risk management tools and technology expertise were combined to a process that resulted in effective business solutions for enhancing supply chain security. As practical results, this study presents a new risk assessment model, the supply chain security and technology management model, and a case study of a solution for integrity monitoring of shipments.

References

    1. 1)
      • Z. Yang , J. Wang , S. Bonsall . Use of fuzzy evidential reasoning in maritime security assessment. Risk Anal. , 1 , 95 - 120
    2. 2)
      • ISO 28001:2007: ‘Security management systems for the supply chain – best practices for implementing supply chain security, assessments and plans – requirements and guidance’, 2007.
    3. 3)
      • K.M. Sweet . (2008) Transportation and cargo security. Threats and solutions.
    4. 4)
      • P. Munday . SECCONDD, final report.
    5. 5)
      • B. Anderson . Strengthening global supply chain security. Security , 6
    6. 6)
      • Frost & Sullivan: ‘Wireless sensors and sensor networks’. D15B, Frost & Sullivan, 2008.
    7. 7)
      • Willis, H.H., Ortiz, D.S.: `Evaluating the security of the global containerized supply chain', Technical report, 2004, http://www.rand.org/pubs/technical_reports/2004/RAND_TR214.pdf, accessed January 2009.
    8. 8)
    9. 9)
      • ‘Freight supplier minimum trucking security requirement (TSR)’. 01-01-2008, rev 1-2, Transported Asset Protection Association, 2008.
    10. 10)
      • J. Paasi . Managing opportunities, risk and uncertainties in new business creation – working report.
    11. 11)
      • P. Crist , M. Crass , M. Miyake . Container transport security across modes.
    12. 12)
      • (2009) ODIN's self-inventorying SMART container breaks new ground in automated RFID tracking.
    13. 13)
      • U. Jüttner , A. Ziegenbein , G.A. Zsidisin , B. Ritchie . (2009) Supply chain risk management for small and medium-sized businesses, Supply chain risk a handbook of assessment, management, and performance.
    14. 14)
      • K. Daschkovska , B. Scholz-Reiter , H.-D. Haasis . (2008) Electronic seals for efficient container logistics, Dynamics in logistics.
    15. 15)
      • J.B. Rice . Rethinking security. Logist. Manage. , 5 , 28 - 30
    16. 16)
      • L. Ritter , M. Barrett , R. Wilson . (2007) Securing global transportation networks: a total security management approach.
    17. 17)
      • Permala, A., Scholliers, J.: `RFID-roadmap for business logistics (CD-ROM)', 13thWorld Congress on Intelligent Transport Systems and Services, 8–12 October 2006, London, GB.
http://iet.metastore.ingenta.com/content/journals/10.1049/iet-its.2009.0124
Loading

Related content

content/journals/10.1049/iet-its.2009.0124
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading
This is a required field
Please enter a valid email address