421
Views
4
CrossRef citations to date
0
Altmetric
Articles

A review of models for transport security and of their relevance for supply chains

Pages 784-800 | Received 13 Aug 2020, Accepted 15 Mar 2022, Published online: 25 Mar 2022

References

  • Arendt, F., Meyer-Larsen, N., & Muller, R. (2012). Practical approaches towards enhanced security and visibility in international intermodal container supply chains. International Journal of Shipping and Transport Logistics, 4(2), 182–196.
  • Autry, C. W., & Bobbitt, L. M. (2008). Supply chain security orientation: Conceptual development and a proposed framework. The International Journal of Logistics Management, 19(1), 42–64.
  • Azaiez, M. N., & Bier, V. M. (2007). Optimal resource allocation for security in reliable systems. European Journal of Operational Research, 181, 773–786.
  • BIMCO, ICS, IGP&I Clubs, INTERTANKO and OCIMF. (2018). BMP5. Best management practices to deter piracy and enhance maritime security in the Red Sea, Gulf of Aden, Indian Ocean and Arabian Sea. Edinburgh: Witherby Publishing Group.
  • Bishop, M. (2005). Psychological acceptability revisited. In L. F. Cranor & S. Garfinkel (Eds.), Security and usability: Designing secure systems that people can use (pp. 1–12). Sebastopol: O’Reilly Media.
  • Bohle, C., Hellingrath, B., & Deuter, P. (2014). Towards process reference models for secure supply chains. Journal of Transportation Security, 7, 255–276.
  • Boyd, A., & Sullivan, J. P. (2000). Emergency preparedness for transit terrorism. TRNews, 208, 12–17.
  • Carvalho Fagundes, M. V., Oliveira Teles, E., Vieira de Melo, S. A. B., & Mendonca Freires, F. G. (2020). Decision-making models and support systems for supply chain risk: Literature mapping and future research agenda. European Research on Management and Business Economics, 26, 63–70.
  • Caunhye, A. M., Nie, X., & Pokharel, S. (2012). Optimization models in emergency logistics: A literature review. Socio-Economic Planning Sciences, 46, 4–13.
  • Chan, F. T. S., & Kumar, N. (2007). Global supplier development considering risk factors using fuzzy extended AHP-based approach. Omega, 35(4), 417–431.
  • Closs, D. J., & McGarrell, E. F. (2004). Enhancing security throughout the supply chain. Washington, DC: Special ReportIBM Center for the business of Government. Retrieved from: http://www.businessofgovernment.org/sites/default/files/Enhancing%20Security.pdf
  • Craighead, C. W., Blackhurst, J., Rungtusanatham, M. J., & Handfield, R. B. (2007). The severity of supply chain disruptions: Design characteristics and mitigation capabilities. Decision Sciences, 38, 131–156.
  • Egli, D. S. (2013). Beyond the storms: Strengthening preparedness, response and resilience in the 21st century. Journal of Strategic Security, 6(2), 32–45.
  • Fahimnia, B., Tang, C. S., Davarzani, H., & Sarkis, J. (2015). Quantitative models for managing supply chain risks: A review. European Journal of Operational Research, 247, 1–15.
  • Heckmann, I., Comes, T., & Nickel, S. (2015). A critical review on supply chain risk: Definition, measure and modeling. Omega, 52, 119–132.
  • Helferich, O. K., & Cook, R. L. (2002). Securing the supply chain: Management Report. Oak Brook, IL: CLM Publications.
  • Hendricks, K. B., & Singhal, V. R. (2005). An empirical analysis of the effect of supply chain disruptions on long-run stock price performance and equity risk of the firm. Production and Operations Management, 14, 35–52.
  • Ireland, R. (2009). The WCO SAFE framework of standards: Avoiding excess in global supply chain security policy. WCO Research Paper N. 3/2009.
  • Khanmohamadi, M., Bagheri, M., Khademi, N., & Ghannadpour, S. F. (2018). A security vulnerability analysis model for the dangerous goods transportation by rail – case study: Chlorine transportation in Texas-Illinois. Safety Science, 110, 230–241.
  • Kern, D., Moser, R., Hartmann, E., & Moder, M. (2012). Supply risk management: Model development and empirical analysis. International Journal of Physical Distribution & Logistics Management, 42(1), 60–82.
  • Kleindorfer, P. R., & Saad, G. H. (2005). Managing disruption risks in supply chains. Productions and Operations Management, 14(1), 53–68.
  • Koliousis, I. (2020). A conceptual framework that monitors port facility access through integrated port community systems and improves port and terminal security performance. International Journal of Shipping and Transport Logistics, 12(4), 251–283.
  • Koliousis, I., Tanveer, U., & Ishaq, S. (2020). A conceptual information sharing framework to improve supply chain security collaboration. International Journal of Value Chain Management, 11(4), 346–365.
  • Leathrum, J. F., Mathew, R., & Mastaglio, T. W. (2009). Modeling and simulation techniques for maritime security. IEEE conference on technologies for homeland security (pp. 636–642). Boston, MA. doi: 10.1109/THS.2009.5168097.
  • Lez’er, V., Muratova, I., & Korpusova, N. (2019). Issues of transport security and human factor. E3S Web of Conferences, 91, 08062. doi:10.1051/e3sconf/20199108062
  • Lu, G., Koufteros, X., & Lucianetti, L. (2017). Supply chain security: A classification of practices and an empirical study of differential effects and complementarity. IEEE Transactions on Engineering Management, 64(2), 234–248. doi:10.1109/TEM.2017.2652382
  • Lu, G., Koufteros, X., Talluri, S., & Hult, G. T. (2019). Deployment of supply chain security practices: Antecedents and consequences. Decision Sciences, 50(3), 459–497.
  • Lukas, L., Hromada, M., & Pavlik, L. (2016). The key theoretical models for the Safety and security ensuring. Third international conference on mathematics and computers in sciences and in industry (MCSI) (pp. 61–65). Chania. doi:10.1109/MCSI.2016.022
  • Metzger, A., Franklin, R., & Engel, Y. (2012). Predictive monitoring of heterogeneous service-oriented business networks: The transport and logistics case. Annual SRII global conference (pp. 313–322). San Jose, CA. doi: 10.1109/SRII.2012.42.
  • Morrall, A., Rainbird, J., Katsoulakas, T., Koliousis, I., & Varelas, T. (2016). E-Maritime for automating legacy shipping practices. Transportation Research Procedia, 14, 143–152.
  • Noureddine, M. A., Marturano, A., Keefe, K., Bashir, M., & Sanders, W. H. (2017). Accounting for the human user in predictive security models. 22nd Pacific Rim international symposium on dependable computing (PRDC) (pp. 329–338). Christchurch. doi: 10.1109/PRDC.2017.58.
  • Papa, P. (2013). US and EU strategies for maritime transport security: A comparative perspective. Transport Policy, 28, 75–85.
  • Pasternack, B. A. (2008). Optimal pricing and return policies for perishable com-modities. Marketing Science: Informations, 27(1), 133–140.
  • Rajagopal, V., Venkatesan, S. P., & Goh, M. (2017). Decision-making models for supply chain risk mitigation: A review. Computers and Industrial Engineering, 113, 646–682.
  • Reggiani, A. (2013). Network resilience for transport security: Some methodological considerations. Transport Policy, 28, 63–68.
  • Rieke, R., & Stoynova, Z. (2010). Predictive security analysis for event-driven processes. In I. Kotenko & V. Skormin (Eds.), Computer network security (pp. 321–328). Berlin: Springer.
  • Russell, D. M., & Saldanha, J. P. (2003). Five tenets of security-aware logistics and supply chains operations. Transportation Journal, 42(4), 44–54.
  • Sarathy, R. (2006). Security and the global supply chain. Transportation Journal, 45(4), 21–28.
  • Schauer, S., Polemi, N., & Mouratidis, H. (2019). MITIGATE: A dynamic supply chain cyber risk assessment methodology. Journal of Transportation Security, 12, 1–35.
  • Sheffi, Y. (2001). Supply chain management under the threat of international terrorism. International Journal of Logistics Management, 12(2), 1–11.
  • Sheu, C., Lee, L., & Niehoff, B. (2006). A voluntary logistics security program and international supply chain partnership. Supply Chain Management: An International Journal, 11(4), 363–374.
  • Siva Kumar, P., & Anbanandam, R. (2020). Theory building on supply chain resilience: A SAP-LAP analysis. Global Journal of Flexible Systems Management, 21(2), 113–133.
  • Speier, C., Whipple, J. M., Closs, D. J., & Douglas Voss, M. (2011). Global supply chain design considerations: Mitigating product safety and security risks. Journal of Operations Management, 29, 721–736.
  • Strandh, V. (2017). Exploring vulnerabilities in preparedness – rail bound traffic and terrorist attacks. Journal of Transportation Security, 10, 45–62.
  • Talarico, L., Reniers, G., Sorensen, K., & Springael, J. (2015). MISTRAL: A game-theoretical model to allocate security measures in a multi-modal chemical transportation network with adaptive adversaries. Reliability Engineering and System Safety, 138, 105–114.
  • Thibault, M., Brooks, M., & Button, K. J. (2006). The response of the US maritime industry to the new container security initiatives. Transportation Journal, 45(1), 5–15.
  • Venus Lan, Y. H., Wong, C. W. Y., Kee-Hung, L., & Cheng, T. C. E. (2008). Institutional perspective on the adoption of technology for the security enhancement of container transport. Transport Reviews, 28(1), 21–33.
  • Viljoen, N. M., & Joubert, J. W. (2016). The vulnerability of the global container shipping network to targeted link disruption. Physica A: Statistical Mechanics and its Applications, 462, 396–409.
  • Williams, Z., Lueg, J. E., & LeMay, S. A. (2008). Supply chain security: An overview and research agenda. The International Journal of Logistics Management, 19(2), 254–281.
  • Xu, L., Chen, L., Gao, Z., Chang, Y., Iakovou, E., & Shi, W. (2018). Binding the physical and cyber worlds: A blockchain approach for cargo supply chain security enhancement, IEEE international symposium on technologies for homeland security (HST) (pp. 1–5). Woburn, MA. doi: 10.1109/THS.2018.8574184.
  • Yang, B., & Yang, Y. (2010). Postponement in supply chain risk management: A complexity perspective. International Journal of Production Research, 48, 1901–1912.
  • Zamparini, L. (2010). Supply chain management. In K. Button, H. Vega, & H. & Nijkamp (Eds.), A dictionary of transport analysis (pp. 385–386). Abingdon: Edward Elgar.
  • Zamparini, L. (2016). Economic issues in multimodal freight transport security. In J. Szyliowicz, L. Zamparini, G. Reniers, & D. Rhoades (Eds.), Multimodal transport security: Frameworks and policy applications in freight and passenger transport (pp. 35–47). Abingdon: Edward Elgar.
  • Zamparini, L. (2018). Economic issues in air transport security. In J. Szyliowicz & L. Zamparini (Eds.), Air transport security: Issues, challenges and national policies (pp. 32–42). Abingdon: Edward Elgar.
  • Zamparini, L., & Reniers, G. (2013). A comparative study of hazardous material transportation security issues in Flanders and in Apulia. Security Journal, 26, 142–156.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.