Efficient security management practices for supply networks: A case study in companies delivering security critical goods

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Abstract

    The paper presents a case study of security management practices, methods and systems used by logistics companies in Northern Europe to prevent or hinder thefts and pilferage. The objective is to assess the efficiency of the practices and discuss the effects of the most significant practices on the security of supply networks at the national and global level. Based on the case study, literature and standard reviews a specific risk assessment model, supply chain security management (SCSM) model, was developed. The research focused on total security management practices. The security management practices of the companies differ according to their position in the chain, their size, type of transported goods and transportation mode. Most of the practices relate to practical security management in everyday operations. Only the forerunning companies have an extensive security management system. The emphasis in many companies is on transport safety while security is managed on the side.The SCSM model presents and evaluates the most significant practices, their applicability and impact to total security management in multi-operator supply chains.
    Original languageEnglish
    Title of host publicationProceedings of the 14th Annual Logistics Research Network Conference
    Place of PublicationCardiff
    Pages656-664
    Publication statusPublished - 2009
    MoE publication typeA4 Article in a conference publication
    Event14th Annual Logistics Research Network, LRN 2009 - Cardiff, United Kingdom
    Duration: 9 Sept 200911 Sept 2009

    Conference

    Conference14th Annual Logistics Research Network, LRN 2009
    Country/TerritoryUnited Kingdom
    CityCardiff
    Period9/09/0911/09/09

    Keywords

    • supply chain security
    • risk management
    • security management systems
    • best practices

    Fingerprint

    Dive into the research topics of 'Efficient security management practices for supply networks: A case study in companies delivering security critical goods'. Together they form a unique fingerprint.

    Cite this