New possibilities of using monitoring technology to improve supply chain security

Sirra Toivonen, Johan Scholliers, Hanna Askola, L Hannola, N Tervonen

    Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

    Abstract

    Modern supply chains are complex, which makes them vulnerable to security incidents. The objective of this paper is to evaluate supply chain tracking and monitoring concepts and to identify new ideas and business opportunities for security services in logistic multi-stakeholder networks. By adding tracking equipment, the security of supply chains can be improved through real time monitoring. Security benefits include the collection of concrete knowledge of security incidents, possibilities to react in real time and to minimise consequences. Developments in sensor and communication technologies allow new supply chain monitoring concepts, and hence new business opportunities. The paper describes the experiences gained in several European and Finnish national projects regarding monitoring technology and the improvement of supply chain security. A critical analysis of the benefits and limitations of implementation of tracking technology is also been described.
    Original languageEnglish
    Title of host publicationTransport Research Arena 2014 (TRA) Proceedings
    Subtitle of host publicationProceedings
    Place of PublicationParis
    Number of pages10
    Publication statusPublished - 2014
    MoE publication typeNot Eligible
    EventTransport Research Arena 2014, TRA 2014 - Paris, France
    Duration: 14 Apr 201417 Apr 2014

    Conference

    ConferenceTransport Research Arena 2014, TRA 2014
    Abbreviated titleTRA2014
    Country/TerritoryFrance
    CityParis
    Period14/04/1417/04/14

    Keywords

    • security
    • supply chains
    • tracking
    • monitoring
    • innovations
    • value

    Fingerprint

    Dive into the research topics of 'New possibilities of using monitoring technology to improve supply chain security'. Together they form a unique fingerprint.

    Cite this