{"title":"The physical distribution security system: Who is affecting the vulnerability of goods transprtation?","authors":"L. Urciuoli","doi":"10.22237/JOTM/1333238700","DOIUrl":null,"url":null,"abstract":"The purpose of this study is to explore the vulnerability of physical distribution networks to antagonistic threats. Previous research identifies globalization and Just in Time (JIT) as the main causes of vulnerability. However, cargo crime has always existed, even before the identification of these trends. In this explorative study new factors are brought to light. In particular, it appears that stakeholders’ dynamics are influencing the level of security. weapons for mass destruction could be used as a weapon against sensitive targets (Rice and Spayd, 2005). As a consequence, governments are actively working to secure their borders and inland transportation systems by setting policies and standards that ultimately demand supply chain companies operate under heightened security (Sheffi, 2001). Previous research points out the importance of risk management approaches to deal with supply chain security (Giunipero and Eltantawy, 2004; Spekman and Davis, 2004). Spekman and Davis (2004) identify six categories of supply chain related risks and illustrate how to classify them. Giunipero and Eltantawy (2004) emphasize the importance of risk management approaches to evaluate end-to-end technology solutions. Some authors have developed supply chain security frameworks and illustrated future research needs (Autry and Bobbitt, 2008; Williams et al., 2008). Autry and Bobbitt (2008) have developed a framework to address how companies approach the mitigation of supply chain security by means of supply chain risk management. Williams et al. (2008) performed a literature review to categorize Supply Chain Security (SCS) factors and to identify a research agenda focusing on intra-organizational activities and quantitative approaches, making explicit the linkage between security and efficiency.","PeriodicalId":242296,"journal":{"name":"Journal of Transportation Management","volume":"60 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Transportation Management","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.22237/JOTM/1333238700","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The purpose of this study is to explore the vulnerability of physical distribution networks to antagonistic threats. Previous research identifies globalization and Just in Time (JIT) as the main causes of vulnerability. However, cargo crime has always existed, even before the identification of these trends. In this explorative study new factors are brought to light. In particular, it appears that stakeholders’ dynamics are influencing the level of security. weapons for mass destruction could be used as a weapon against sensitive targets (Rice and Spayd, 2005). As a consequence, governments are actively working to secure their borders and inland transportation systems by setting policies and standards that ultimately demand supply chain companies operate under heightened security (Sheffi, 2001). Previous research points out the importance of risk management approaches to deal with supply chain security (Giunipero and Eltantawy, 2004; Spekman and Davis, 2004). Spekman and Davis (2004) identify six categories of supply chain related risks and illustrate how to classify them. Giunipero and Eltantawy (2004) emphasize the importance of risk management approaches to evaluate end-to-end technology solutions. Some authors have developed supply chain security frameworks and illustrated future research needs (Autry and Bobbitt, 2008; Williams et al., 2008). Autry and Bobbitt (2008) have developed a framework to address how companies approach the mitigation of supply chain security by means of supply chain risk management. Williams et al. (2008) performed a literature review to categorize Supply Chain Security (SCS) factors and to identify a research agenda focusing on intra-organizational activities and quantitative approaches, making explicit the linkage between security and efficiency.
本研究的目的是探讨物理分销网络对对抗威胁的脆弱性。以前的研究认为全球化和准时制(JIT)是造成脆弱性的主要原因。然而,货物犯罪一直存在,甚至在确定这些趋势之前就存在了。在这一探索性研究中,发现了一些新的因素。特别是,涉众的动态似乎正在影响安全级别。大规模杀伤性武器可以用作对付敏感目标的武器(Rice and Spayd, 2005)。因此,各国政府正积极努力通过制定政策和标准来确保其边境和内陆运输系统的安全,最终要求供应链公司在高度安全的情况下运营(Sheffi, 2001)。先前的研究指出了风险管理方法对处理供应链安全的重要性(Giunipero和Eltantawy, 2004;斯佩克曼和戴维斯,2004)。Spekman和Davis(2004)确定了六类供应链相关风险,并说明了如何对它们进行分类。Giunipero和Eltantawy(2004)强调了评估端到端技术解决方案的风险管理方法的重要性。一些作者已经开发了供应链安全框架,并说明了未来的研究需求(Autry和Bobbitt, 2008;Williams et al., 2008)。Autry和Bobbitt(2008)开发了一个框架来解决公司如何通过供应链风险管理来缓解供应链安全的问题。Williams等人(2008)进行了文献综述,对供应链安全(SCS)因素进行了分类,并确定了侧重于组织内活动和定量方法的研究议程,明确了安全和效率之间的联系。