Sie sind auf Seite 1von 18

KIRLOSKAR INSTITUTE OF ADVANCED MANAGEMENT STUDIES, PUNE

MANAGEMENT INFORMATION SYSTEM PRESENTATION ON Visibility Platforms for Enhancing Supply Chain Security: a Case Study in the Port of Rotterdam

Presented To: Prof. Vinay Bhushan

Presented by: Apoorva Kulshreshtha(1003) Saumik Bhattacharjee(1025)


18-Jan-13

Keywords Background Supply Chain Security Security Risk in Global Three different layers of supply chain Security Measures and Requirements Importance of Supply Chain Visibility Information needed for implementing security measures Components and Gap Analysis Possible Analysis Utilization

18-Jan-13

18-Jan-13

18-Jan-13

Complex supply chains are becoming vulnerable for attacks by terrorists and criminals. Some companies have a long records for taking measure against such threats, others have recently started. Focus is on air transport and containerized transport.

18-Jan-13

A secure supply chain is a supply chain where various measures have been taken to guarantee a certain level of security.(information flow + money flow+ physical flow)

Main reasons for this includes terrorist, theft, piracy, smuggling, counterfeiting.
Supply chain security is a wide concept, which entails both physical versus non physical security and preventive versus corrective measures.

18-Jan-13

A typical port supply chain with an export flow, ocean transport and an import flow include: Warehouse loading container inland transport transshipment ocean transport transshipment inland transport unloading container warehouse The largest security risks are found in those nodes where vulnerability for disruption is relatively high and security controls or measures in place are relatively low. E.g. barge transport.

18-Jan-13

I Layer: This relates to physical activities. II Layer: This is a layer of contracting or transaction activities that encompass all commercial relationship between parties in the chain. III Layer: This is a governance layer in which all governing bodies with their inspection and verification activities are included.

18-Jan-13

Mobile units can be used to conceal and transport illegal items. Potential security related risk are associated at following points: Point of stuffing of container Point of stripping of container Stop during the inland transport Handling of empty container

18-Jan-13

These are more or less related to security of information accompanying the logistical process Following security risk are described under British standard 7799: Confidentiality of data Integrity of data Availability and timelessness of data Non-repudiation

10

18-Jan-13

There are three types of possible measures viz: Preventive Measures: Putting gates, High fences, Surveillance camera Detective Measures: Scanning the container Corrective Measures: Crisis Management Plan
11 18-Jan-13

Lee and Wolfe (2003) describe three generic requirements or measures from a security perspective for creating a secure freight system: 1. Assuring integrity of conveyance loading, documentation and sealing 2. Reduce risk of tampering in transit (with comprehensive monitoring of tampering and intrusion) 3. Provide accurate, complete and protected information about shipments to those who need it in a timely manner
12 18-Jan-13

,.

Supply chain security can be reduced by increasing the visibility of supply chain. Three types of information are relevant in this aspect viz.: Cargo information Process information Information about integrity of the goods and the cargo carrier This also leads to logistics efficiency. Visibility helps in early identification of sources of risk. It also helps in early identification of disruption.

13

18-Jan-13

The most important information needed are as follows: Booking Information Cargo Information Nuclear Detection X-Ray scan Container status Operator and location information Seal Certificate Information Personnel

14

18-Jan-13

Components in Supply Chain Visibility Platform(SCVP) Data capture Electronic and ante tampering devices Containers and movement stand still Stakeholder requirement: results in gap analysis and other to distinguish in between width and depth coverage

15

18-Jan-13

Contrast in Government driver and market driver, former high and later low New regulations initiated to find the benefit of the business, the driver remains low Advantage for stakeholder: business and government driver both are high.

16

18-Jan-13

Shippers Operators Authorities


Contrast in trust based and monitoring paradigm with the existence for the both

17

18-Jan-13

18

18-Jan-13

Das könnte Ihnen auch gefallen