**Author details**

176 Risk Management – Current Issues and Challenges

opportunities.

**5. Conclusions** 

Other types of security programmes existed before the attacks on the World Trade Centre. These programmes were designed primarily to address theft problems within the transport business. The big difference between security programmes before and after the terrorist attacks is that afterwards, authorities (mainly U.S.) took the lead in developing and implementing these programmes. Before September 11, 2001, security was something the business itself handled. The implementation of these programmes has so far mainly

The cost for implementing these programs alters the current collaboration models with regards to risk and profit sharing within the supply chain. The risks for antagonist threats are depended on the local environment. This shall be compared with that the security programs advocates one to three different security levels which shall solve the problem. This leads to that the security level is adjusted towards the security programs instead of the local threat. This may lead to that the security cost is higher than needed but a standardisation within the supply/transport chain in security may result in better collaboration. The political reasons behind the different supply chain security programs is most likely the fear for terrorist attacks which according to [32] depends more on the *proliferation of mass media* than development of new weapons. This is the context to understand the content and effects from fear of terrorist against international trade. Nevertheless the supply chain security programs provides collateral benefits like better product control, lesser shrinkage and better incident prevention by reducing threat

The compliance with these different logistics security programs are based on different reasons. The compliance with business logistics security programs (like TAPA:s) are based on customer requirements. This depends on the simple fact that these programs are focusing on theft prevention. The governmental logistics security programs like AEO, C-TPAT, CSI etc. are on other hand more focusing on preventing terrorist activities. These programs normally also contains some kind of disadvantage for the own organisation if not compliance. Therefore are the governmental logistics security programs entail with a higher likelihood of compliance due to that need for compliance are not based on a risk assessment about the potential causes and impacts for antagonistic threats but on a general business assessment. For legal businesses, the AEO, C-TPAT, etc., are both a global supply chain headache and a business opportunity, depending on the risk for theft and counterfeiting for that company [114]. Irrespective of the difference in compliance reasons, the governmental logistics security programs may result in collateral benefits like lower cost for theft and better working conditions for the employees but there are still to be demonstrated that the terrorism preventing logistics security programs actually reduces the risk for non-

economical-driven antagonistic threats because it's their primer reason for existing.

First, [1] clearly points out the effects of the WTC terrorist attacks on the global flow of goods. The effect may be indirect, but it was devastating. This event along with non-

occurred in the old western countries in North America and in Europe.

Daniel Ekwall *School of Engineering, University of Borås, Borås, Sweden Supply Chain Management and Corporate Geography, Hanken School of Economics, Helsinki, Finland* 

#### **6. References**

[1] Sheffi, Y. (2001), "Supply chain management under the threat of international terrorism". *International journal of logistics management*, Vol. 12, No. 2, pp. 1-11.

pp. 29,

*ESCB 09*, Prague

Europol, The Hague

Netherlands

Swedish)

pp. 7-24

639-643

*ECR Europe*, Brussels, Belgium

doi: 10.1057/palgrave.rm.8250039

agreement n°SI2.448309

4, pp. 325- 344

*risk of Counterfeit Medicines*, Brussels

consequences, (ec.europa.eu)

Supply Chain Security – Threats and Solutions 179

[21] Barth, S. and White, M. D. (1998), "Hazardous cargo". World Trade, November 1998,

[22] Tryon, G. and Kleiner, B. (1997), "How to investigate alleged employee theft properly".

[23] Robinson P. V. (2009), "Freight crime in Europe: what happens next?". *A presentation at* 

[25] Beck, A. (2002), "Automatic product identification & shrinkage: Scoping the potential".

[26] Europol, (2009), *Cargo theft report: Applying the Brakes to Road Cargo Crime in Europe*.

[28] Europol (2010), "EU Terrorism Situation and Trend Report 2010". The Hague,

[29] Johnston, R. B. and Nedelescu, O. M. (2006), "The impact of terrorism on financial

[30] Rystad, G. (2006), *Politiska mord – det yttersta argumentet*. Historiska media, Lund (in

[31] Sjöberg, L. (2008), "Antagonism, trust and perceived risk". *Risk Management*, 10**,** 32 – 55.

[32] Gearson, J. (2002), "The nature of modern terrorism". *The political quarterly publishing*,

[33] Burke, R. J. (2005), "International terrorism and threats to security: Implications for organizations and management". *Disaster Prevention and Management*, Vol. 14, No. 5, pp.

[34] Aggarwal, R. and Bohinc, J. (2011), "Black swans and supply chain strategic necessity".

[35] Rodwell, S. and Van Eeckhout, P. and Reid, A. and Walendowski, J. (2007), *Study: Effects of counterfeiting on EU SMEs and a review of various public and private IPR enforcement initiatives and resources*. Framework contract B3/ENTR/04/093-FC-Lot 6 Specific

[36] EU Commission (2008), *Public Consultation in preparation of a Legal Proposal to combat counterfeit medicines for Human Use - Key Ideas for better Protection of Patients against the* 

[38] Bouchard, M. (2007), "On the resilience of illegal drug markets". *Global crime*, Vol. 8, No.

[39] Huang, J-H. and Lee, B. and Ho, S. (2003), "Consumer attitude toward gray market

[40] EC, European Commission: Combating counterfeit & piracy, The economic

*Managerial auditing journal*, Vol. 12, MCB University Press.

markets". *Journal of Financial Crime*, Vol. 13, No. 1, pp. 7-25

*Journal of Transportation Security,* DOI 10.1007/s12198-011-0080-5

[37] DEA, U.S. Drug Enforcement Administration, (www.dea.gov)

goods". *International Marketing Review*, Vol. 21 No. 6, pp. 598-614.

[24] Muir, J. (1996), "Theft at work". *Work Study*; Vol. 45.

[27] Napoleoni, L (2004), *Terror inc*. Penguin books ltd.


178 Risk Management – Current Issues and Challenges

logistics". Kogan-page, London

*Networks*, Prentice Hall, London

[1] Sheffi, Y. (2001), "Supply chain management under the threat of international terrorism". *International journal of logistics management*, Vol. 12, No. 2, pp. 1-11. [2] Waters, D. (2007),"Supply chain risk management: vulnerability and resilience in

[3] Ekwall, D. (2009) *Managing the Risk for Antagonistic Threats against the Transport network*, Division of Logistics and Transportation, Chalmers University of Technology:

[4] Christopher, M (2005), *Logistics and Supply Chain Management – Creating Value-adding* 

[5] Bowersox, D.J. and Closs, D. J. and Cooper, M. B. (2002), *Supply Chain Logistics* 

[7] Ruijgrok, C. and Wandel, S., and Nemoto, T. (1991). "Advanced Logistics and Road

[8] Wandel, S. and Ruijgrok, C. (1995), "Information technologies for the development of transport and logistics". *ATAS Bulletin information for development*, United Nations, New

[9] Ekwall, D. (2010), "On analyzing the official statistics for antagonistic threats against transports in EU: a supply chain risk perspective". *Journal of Transportation Security*, Vol.

[10] Francis, T. L. (1986), "A dynamic model of corruption deterrence. *Journal of Public* 

[12] EUICS (2005), *The Burden of Crime in the EU, A Comparative Analysis of the European* 

[14] ECR (2003), *Shrinkage: A Collaborative Approach to Reducing Stock Loss in the Supply Chain*.

[16] Anderson, B. (2007), "Securing the Supply Chain – Prevent Cargo Theft". *Security*, No 5,

[17] EP - European Parliament's Committee on Transport and Tourism, (2007), *Organised theft of commercial vehicles and their loads in the European union*. European Parliament,

[19] IRU (2008), Attacks on drivers of international heavy goods vehicles.

[20] Dillén, J. and Ekwall, D. (2006), "Brott mot yrkestrafiken". Transek 2006:10 (in Swedish).

[18] ECMT (2001), *Theft of goods and goods vehicles*. CEMT/CM (2001)19, Lissabon.

INTERNATIONAL ROAD TRANSPORT UNION, GENEVA

*Management*, McGraw Hill/Irwin series, Boston (2nd Edition)

Freight Transport", *OECD Road Transport Research*, Chapter IV

[11] Eurostat, 2009, *Criminal and criminal justice*. Statistics in focus 36/2009

[13] NRSS (2002), *National Retail Security Survey*. University of Florida

[15] TAPA (2006), TAPA Loss Data Benchmark Survey 2006.

[6] Lumsden, K. (2006), *Logistikens grunder*. Studentlitteratur, Lund (*in Swedish*)

**6. References** 

Göteborg.

York.

3, No. 4, pp 213-230

Vol. 44, pp. 56-58

Brussels

*Economics*, Vol. 31, pp 215-236

*Survey of Crime and Safety*. (EU ICS).

ECR Europe, Brussels, Belgium


[41] Ekwall, D. (2009), "The risk for detection affects the logistics system setup for cargo smugglers". *In proceedings of Nofoma 2009*, Jönköping.

Texas.

Cambridge, MA: MIT Press.

Perpetuity Press.

Vol. 44, pp. 110-115

of Chicago press.

Heston, New York.

*Swedish*)

Supply Chain Security – Threats and Solutions 181

[58] Mankiw, N.G. (1997), *Principles of microeconomics*. The Dryden Press, Fort Worth

[59] Bodman, P. and Maultby, C. (1997), "Crime, punishment and deterrence in Australia".

[60] Gigerenzer, G. and Reinhard, S. (2002), *Bounded Rationality: The Adaptive Toolbox*.

[63] Felson, M. and Clarke, R.V. (1998), "Opportunity makes the thief: Practical Theory for

[64] Kroneberg, C. and Heintze, I. and Mehlkop, G. (2010), "The interplay of moral norms and instrumental incentives in crime causation". *Criminology*, Vol. 48, No. 1, pp 259-294 [65] Bergman, M. (2007), Straff och nåd speglar samhället. *Svenska Dagbladet*, november 2 (*in* 

[66] Horney, J. and Marshall, I. H. (1992), "Risk perceptions among serious offenders: the

[67] Badolato, E.V. (2000), "Smart moves against cargo theft". *Security Management*, No 7,

[70] Felson, M. (1987), "Routine activities and crime prevention in developing metropolis".

[71] Ekwall, D. (2009), "The Displacement effect in cargo theft". *International Journal of* 

[72] Purtell, D. and Rice, J. B. (2006), "Assessing cargo supply risk". *Security management*,

[73] Urciuoli, L. (2008), *Security in Physical Distributions*. Department of Industrial

[74] Speed, M. (2003), "Reducing employee dishonesty: In search of the right strategy".

[75] Clarke, R. V. (1995), "Situational crime prevention". In Tonry, M. and Farrington, D.P. (eds), *Building a safer society: strategic approaches to crime prevention*. Chicago: University

[76] Lab S. P. (2000), *Crime prevention: Approaches, practices and evaluations*. Fourth edition.

[77] Clarke, R. V. (1992), *Situational crime prevention: Successful case studies*. Harrow and

[68] Tarnef, B. (2006), "Combating Cargo Theft". *American Agent & Broker*, Vol. 78, No. 10. [69] Williams, R. and Bertsch, B. and Dale, B. and van der Wiele, T and van Iwaarden, J and Smith, M. and Visser, R. (2006), "Quality and risk management: what are the key

crime prevention". Home office police and reducing crime unit: London

role crime and punishment". *Criminology*, Vol. 30, No. 4, pp. 575-594.

*Physical Distribution and Logistics Management,* Vol. 39, No. 1, pp. 47-62

issues?". *The TQM Magazine*, Vol. 18, No. 1, pp. 67-86

Management and Logistics, Lund University: Lund

*Security journal*, Vol. 16, No. 2, pp 31-48, Perpetuity Press.

*Criminology*, Vol. 25, No. 4, pp. 911-932

November, pp.78-87, ASIS international.

Andersson Publishing Co, Cincinnati US.

[61] Simon, Herbert A. 1982. Models of Bounded Rationality. Cambridge, MA: MIT Press. [62] Manunta, G. (1999), "What is security?". *Security journal*, Vol. 12, No. 3, pp 57-66,

*International journal of social economics*, Vol 24. pp 884-901.


[58] Mankiw, N.G. (1997), *Principles of microeconomics*. The Dryden Press, Fort Worth Texas.

180 Risk Management – Current Issues and Challenges

*Global crime*, Vol. 8, No. 4, pp. 393-398

smugglers". *In proceedings of Nofoma 2009*, Jönköping.

Supply chain security, Vol. 1. ABC-CLIO, Santa Barbara

*Maritime Law Journal,* Vol. 21, No. 2, pp. 139-166.

*action research*, vol 16, no. 6, pp. 437-454

*management*, Vol. 32, No. 1, pp. 22-40.

*management*, Vol. 38, No. 10, pp. 746-763.

*Security Journal,* Vol. 23, No 1, pp. 37–51.

10, pp. 854-885.

55

*Security, and Environment*. Maritime Knowledge Centre, IMO

chain". *Journal of Transportation Security*, Vol. 3, No. 4, pp. 231-243

[42] Naylor, R (2004), *Wages of crime.* Cornell University Press. Ithaca.

[41] Ekwall, D. (2009), "The risk for detection affects the logistics system setup for cargo

[43] Antonopoulos, G. A. (2007), "Cigarette smugglers: A note on four "unusual suspects"".

[44] Jannati, F. and Salimi, M. (2011) *Modern Sea piracy - Modus operandi and economical and development state backgrounds*. School of Engineering, University of Borås, Sweden [45] Abeyratne R (2010) Managing the twenty-first century piracy threat. In: Thomas A (ed)

[46] Sullivan, A. (2010), "Piracy in the Horn of Africa and its effects on the global supply

[47] Onuoha. F, C, (2009), "Sea piracy and maritime security in the Horn of Africa: The Somali coast and Gulf of Aden in perspective". African Security Studies, Vol. 18, No. 3,

[48] Madden, M. (2009), "Trading the Shield of Sovereignty for the Scales of Justice: A Proposal for Reform of International Sea Piracy Laws". *University of San Francisco* 

[49] IMO (2011) *Ship and Shipping Facts & Figures – Information Resources on Trade, Safety,* 

[50] Stock, J. R. (1997), "Applying theories from other disciplines to logistics". *International journal of physical distribution & logistics management*, Vol. 27, No. 9, pp. 515-539. [51] Solem, O. (2003), "Epistemology and logistics: A critical overview". *Systemic practice and* 

[52] Arlbjörn, J.S. and Halldorsson, A. (2002), "Logistics knowledge creation: reflections on content, context and processes". *International journal of physical distribution & logistics* 

[53] Gubi, E., and Arlbjørn, J.S., and Johansen, J. (2003), "Doctoral dissertations in logistics and supply chain management. A review of Scandinavian contributions from 1990 to 2001". *International Journal of Physical Distribution & Logistics Management*, Vol. 33, No.

[54] Aastrup, J. and Halldórsson, A (2008), "Epistelmological role of case studies in logistics: a critical realist perspective". *International journal of physical distribution & logistics* 

[56] Sherman, L.W. and Gartin, P. R. and Buerger, M. E. (1989), "Hot spots of predatory crime: routine activities and the criminology of place. *Criminology*, Vol. 27, No. 1, pp. 27-

[57] Sampson, R. and Eck, J.E. and Dunham, J. (2010), "Super controllers and crime prevention: A routine activity explanation of crime prevention success and failure".

[55] Sarnecki, J. (2003), *Introduktion till kriminologi*. Studentlitteratur, Lund (*in Swedish*)

pp. 31-44


[78] Clarke, R. V. and Homel, R. (1997), "A revised classification of situational crime prevention techniques". In, Lab, S. P. (ed.) *Crime prevention at a crossroads*. Andersson Publishing Co Cincinnati US.

114-121.

London

pp. 289–300.

McGraw Hill, NY

*Journal*, Vol. 11, No 4, pp.363–374.

Vol. 1, No. 2, pp 101-105

*No. 4,* pp. 326-342

192-223

pp.29-51

Supply Chain Security – Threats and Solutions 183

[95] Yu, Z. and Yan, H. and Cheng, E. (2001), "Benefits of information sharing with supply chain partnerships". *Industrial Management & Data Systems*, Vol. 101, No. 3, pp.

[96] Cox, A. and Ireland, P. and Lonsdale, C. and Sanderson, J. and Watson, G. (1992), *Supply chains, markets and power: mapping buyer and supplier power regimes*. Routledge,

[97] Cox, A. (2001): The Power Perspective in Procurement and Supply Management. *Journal* 

[98] Closs, D. and McGarrell, E. (2004), "Enhancing Security Throughout the Supply Chain"*.*

[101] Manuj, I. and Mentzer, J.T. (2008), "Global supply chain risk management strategies". *International Journal of Physical Distribution & Logistics Management*, Vol. 38, No. 3, pp.

[102] Ritter, L. and Barrett, J. M. and Wilson, R. (2007), *Securing global transportation networks*.

[103] Sarathy, R. (2006), "Security and the global supply chain". *Transportion journal*, fall,

[104] Sheu, C. and Lee, L. and Niehoff, B. (2006), "A voluntary logistics security program and international supply chain partnership". *Supply Chain Management: An International* 

[105] Fletcher, T. (2007), "Authorised economic operator (AEO) programs: IBM's

[106] Gutiérrez, X. and Hintsa, J. and Wieser, P. and Hameri, A-P. (2007), "Voluntary supply chain security program impact: an empirical study with basc member companies".

[107] Grainger, A. (2007), "Supply chain security: adding to a complex operational and

[108] Tweddle, D. (2007), "Logistics, security and compliance: The part to be played by authorized economic operators (AEOs) and data management". *World Customs Journal***,** 

[109] Mazeradi, A. and Ekwall, D. (2009)," Impacts of the ISPS code on port activities – A case study on Swedish ports". *World Review of Intermodal Transportation Research*, *Vol. 2,* 

[110] Powanga, L. (2006), "A business perspective of US International Seaborne Security

Measures: Impact on Importers". *Journal of Global Business*, Vol. 33, pp.63-75

institutional environment". *World Customs Journal***,** Vol. 1, No. 2, pp 17-30

perspective"*. World Customs Journal***,** Vol. 1, No. 2, pp 61-66

*World Customs Journal***,** Vol. 1, No. 2, pp 31-48

[99] Sweet, K. (2006), *Transportation and Cargo security*. Pearson Prentice Hall, New Jersey. [100] Lee, H.L. and Whang, S. (2003), "Higher supply chain security with lower cost: Lessons from total quality management". *International journal of production economics*, 96,

*of Supply Chain Management*, Vol. 37, nr. 2, ss. 4-7

IBM Centre for the business of government.


[95] Yu, Z. and Yan, H. and Cheng, E. (2001), "Benefits of information sharing with supply chain partnerships". *Industrial Management & Data Systems*, Vol. 101, No. 3, pp. 114-121.

182 Risk Management – Current Issues and Challenges

Publishing Co Cincinnati US.

*and Delinquency*, Vol. 22, pp. 166-177.

*journal*, Vol. 15, No. 2, pp 43-55, Perpetuity Press.

*The Journal of Risk and Insurance*, Vol. 70, No. 1, 53-72

revolutionaries". *Omega,* Vol. 25, No. 6, pp. 605-618.

*Management*, Vol 9, No 2, pp.1-20

University of Chicago press.

Springer-Verlag.

press.

Helsinki

25.

Publishers, Boston.

Longman London.

[78] Clarke, R. V. and Homel, R. (1997), "A revised classification of situational crime prevention techniques". In, Lab, S. P. (ed.) *Crime prevention at a crossroads*. Andersson

[79] Tyska, L.A. and Fennelly, L.J. (1983), *Controlling cargo theft*. Woburn: Butterworth

[80] Crawford, A. (1998), *Crime prevention and community safety: Politics, policies and practice*.

[82] Reppetto. T. A. (1976), "Crime prevention and the displacement phenomenon". *Crime* 

[83] Hesseling, R. (1994), "Displacement: A review of the empirical literature". In, Clarke, R. (ed.) *Crime prevention studies,* Vol 3, pp. 197-230. Monsey, NY: Criminal Justice Press. [84] Clarke, R. V. and Cornish, D. (1985), "Modelling offenders decisions: A framework for policy and research". In Tonry, M and Morris, N (ed.), *Crime and justice*, Vol. 4, Chicago:

[85] Clarke, R. V. and Cornish, D. (1990), "Crime specialization. Crime displacement and rational choice". In, Wegener, H. (eds), *Criminal behaviour and justice system*. New York:

[86] Barr, R. and Pease, K. (1990), "Crime placement, displacement and deflection". In Tonry, M and Morris, N (ed.), *Crime and justice*, Vol. 12, Chicago: University of Chicago

[87] Manunta, G. (2002), "Risk and security: Are they compatible concepts?". *Security* 

[90] Ekwall, D. and Nilsson, F. (2011), "Reallocation of risks within supply chains: The practice of enhanced liability clauses". *In proceedings of Nofoma 2011*, Harstadt [91] Kelly, M. and Kleffner, A. E. (2003), "Optimal Loss Mitigation and Contract Design".

[92] Mears-Young, B. and Jackson, M. (1997), **"**Integrated logistics - call in the

[93] Gentry, J. (1996), "Carrier involvement in buyer-supplier strategic partnerships". *International Journal of Physical Distribution & Logistics Management*, Vol. 26, No 3, pp.14-

[94] Lambert D. and Cooper, M. and Pagh, J. (1998), "Supply Chain Management: Implementation Issues and Research Opportunities". *The International Journal of Logistics* 

[88] Clutterbuck, R. (1987), *Kidnap, hijack and extortion*. Basingstoke Macmillan, London [89] Ekwall, D. and Nilsson, F. (2008), "Using business complexity to handle supply chain risk: Dealing with borders of cargo liability". *In proceedings of Nofoma 2008*,

[81] Borodzicz, E. P. (2005), *Risk, crisis & security management*. Wiley, Chichester


[111] Haughton, M.A. (2007), "Examining the business case for shipper participation in Canada USA trade security programmes". *International Journal of Logistics Research and Applications*, Vol. 10, No. 4, pp.315-331

**Chapter 0**

**Chapter 9**

**Dynamic Risk Management Strategies with**

Omar Gaci, Hervé Mathieu, Jean-Pierre Deutsch and Laurent Gomez

Additional information is available at the end of the chapter

http://dx.doi.org/10.5772/50138

**1. Introduction**

**Communicating Objects in the Supply Chain of**

**Chemical Substances Within the European Union**

Supply chain is a set of activities involving a group of commercial actors to create a product or a service to satisfy a customer demand. The actors are the ones who form the supply chain,

In this chapter, our objective is to describe dangers for people, environment and goods from dangerous goods exploitation. We want to show how dangerous goods can be source of accidents during storage activities. To understand the potential of chaining event we elaborate

This risk study in warehouse provides insights to elaborate a risks management strategy relying on communicating objects such as RFID tags and wireless sensors. Then, by exploiting the technical features that provides these smart items, it becomes possible to detect in real time

This chapter is organized as follows. Part 2 introduces briefly what supply chain management is and gives some definitions. Part 3 describes dangerous goods in logistics and notably the risks inherent to their storages. Current regulations such as CLP is presented, it provides a standard in the European Union to classify and identify dangerous goods. Risks relative to dangerous goods manipulation are presented, segregation strategies and storage constraints must be respected to maintain the security within a warehouse. In part 4, a risk study is lead to extract three scenarios that describe the domino effect consecutive to accidents. These scenario are treated further in part 5 when communicating objects are integrated at pallet level. Then, these smart items allow elaborating real-time risk assessment that contribute to detect early

they are suppliers, transporters, manufacturers, distributors, retailers and customers.

accident scenario to describe the consequences of such accidents.

accident risks and to deploy emergency procedures to mitigate that risks.

This work is funded by German BMBF and French ANR as part of ReSCUeIT project.

©2012 Gaci et al., licensee InTech. This is an open access chapter distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0),which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly

©2012 Gaci et al., licensee InTech. This is a paper distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

any accident risks and to react in consequence.

cited.


[114] Holmes, J. L. (2004), " The container security initiative: is container security a global challenge or a supply chain headache". *Fleet Equipment*, August 1
