Maritime Supply Chain Security: A Critical Review
Michele Acciaro1,* and Patrizia Serra 1,2
1
Dept. of Logistics, The Kühne Logistics University, Hamburg, Germany
2
University of Cagliari, Cagliari, Italy
Abstract
The importance of container security for international trade is well established and has been the subject of
recent research in the follow up of the implementation of global security initiatives and the imperative of
avoiding supply chain disruptions and reduce vulnerability. This article provides a review of the emerging
literature on container security specifically in its interface with global logistics systems. The paper highlights
the topics that have emerged as well-established research areas and indicates in what areas scholarly attention
is most needed.
Keywords: Container Security; Supply Chain Security; Container Transportation.
1.
Introduction
Container transportation is the backbone of globalization and international trade and has allowed countries
and firms to improve efficiency and reliability of their supply chains. The development of the container has
been the critical innovation responding to the requirements of a globalized world, as shown by the average
double-digit growth rates of container transportation in the last half century. The development of
containerization has allowed for increases in loading and unloading efficiency unimaginable before.
As container transportation increased and became more global, supply chains became more dependent on the
box, with industrial processes deeply entwined with the global supply chain management strategies necessary
to production and delivery of goods to markets worldwide. The benefits of such development are undeniable,
but the dependence of modern industrial production to global supply chains has inadvertently exposed the
world economy to a new source of risk: container supply chain vulnerability.
While on the one side the development of container transport has substantially reduced the risks of cargo
damage and pilferage, which had been the predicament of transportation providers and cargo owners for
centuries, on the other side, the resulting international nature of global supply chains as well as the relative
lack of visibility of chains worldwide, has exposed container transport, and consequently supply chains, to the
most diverse threats.
Contraband, smuggling of people and weapons, terrorist attacks and piracy are all too well-known criminal
activities that can cause disruptions and costs increases in container-dependent transport chains. The very
nature of globalized container transportation, with container boxes transiting the most remote corners of the
world and the necessary reliance of logistics service providers on agents and operators often beyond the direct
control of the cargo interest, have allowed criminal and terrorist organisations to interfere with container
supply chains and make use of the world transport for malicious endeavours.
Organisations and governments have responded with policies and practices aiming at reducing the exposure of
supply chains to voluntary acts of breach and intentional chain disruptions. The application of policies,
procedures and technologies aiming at reducing such exposure and at protecting, people, goods, facilities and
*
Corresponding author. Address: Brooktorkai 20, 20459, Hamburg, Germany; e-mail:
[email protected];
telephone. +49 40 328707281; fax +49 40 328707209.
1
equipment in the chain, as well as preventing malicious interferences on the normal flow of goods and
information with the objective of allowing contraband or theft, are referred to as supply chain security (SCS)
(Closs & McGarrell, 2004).
Ensuring security of maritime supply chains is critical to international trade (Closs & McGarrell, 2004).
Although SCS is a rather developed area of research (Williams, Lueg, & LeMay, 2008), fewer studies have
focused so far on maritime and container SCS (Barnes & Oloruntoba, 2005; Marlow, 2010; C. Yang & Wei,
2013). Container shipping and maritime security can be defined as “those measures employed by owners,
operators, and administrators of vessels, port facilities, offshore installations, and other marine organizations
or establishments to protect against seizure, sabotage, piracy, pilferage, annoyance, or surprise” (Hawkes,
1989: pg.9).
Nation State and firm responses to the increasing threats associated with global chains have been diverse and
multifaceted, and only after the events of 9/11 has the global approach to SCS, somewhat under the stimulus
of the USA foreign policy, been characterised by a renewed and coordinated international efforts. The results
of such efforts have been controversial, and it is beyond the scope of this manuscript to review the global
order approaches that have influenced international relations in the last decade and a half, nor, for that matter,
to express any judgement on the success of such approaches in defeating terrorism or reducing supply chain
vulnerability and disruptions. What can though be assessed is that such policies have stimulated global and
interdisciplinary discourses on the importance of supply chain vulnerability and disruptions, and contributed
defining SCS as an autonomous area of academic investigation in the broader domain of supply chain risk
management.
The academic literature in the last fifteen years has highlighted the benefits of container security and a
distinctive amount of analyses have been developed with the purpose of facilitating SCS initiatives, assess
current practices and provide policy makers and the industry with scientific support on the elaboration of new
security strategies. The area of container security is a dynamic and evolving discipline, shaped equally but
governmental efforts to reduce security threats and industry practices to minimize security breaches costs and
ultimately maintain or enhance the competitive position of the firm.
The multifaceted nature of supply chain security entails that the literature is often fragmented and it is
challenging to identify clear research developments and trends (Williams, Lueg, & LeMay, 2008). Hence, a
continuous effort to update and refine the frameworks and structures developed is imperative, and even more
so for those research areas that are emerging and interdisciplinary in nature as SCS. Furthermore, the SCS
literature had only recently started to focus in container transportation. Considering the pivotal role that
container transportation has on global production systems, it has been recommended more attention be
dedicated to this area.
This paper contribution to the existing discourses on SCS is two-folds. Firstly, it reviews supply chain security
literature from the specific perspective of container security, highlighting the specificities of container
transport with respect to SCS literature. This is important given the critical role that container transportation
plays in the supply chain process (Closs & McGarrell, 2004; C. Yang & Wei, 2013). Secondly, by focusing on
the literature of the last five years this review highlights how the conceptual structures and frameworks
elaborated in the literature respond to the new developments in the discipline. Testing and reviewing
conceptual and empirical frameworks is particularly important in container SCS, considering the dynamically
evolving and often elusive nature of the discipline.
This review is structured in the six sections. This introduction provides the background for the analysis and
highlights why a literature review in container SCS is expedient. Section two outlines the process and the
overall structure used for the review. Section three focuses on the analysis of the antecedents to container SCS.
Section four analysis the policy, practice and technological developments that have characterised the
enhancement of container SCS in the last half decade. Section five reviews the organisation and process
frameworks that have been used for maritime SCS. Section six reviews those contributions that have
addressed the major outcomes to SCS. And finally section six summarises the major findings of the paper and
indicates the areas where scholarly attention is most recommended.
2
2.
Literature review structure
The SCS has increased substantially in the last decade and a half and has advanced the knowledge of SCS in
multiple directions, but no specific attention has been dedicated to container SCS. In the search for a suitable
container SCS security we have therefore looked at the recent SCS reviews and supply chain risk management.
Previous literature reviews, such as Williams et al. (2008), Gould et al. (2010), and more recently Colicchia &
Strozzi (2012) have employed different methods to summarise the existing literature. Williams et al. (2008)
was one of the first papers to carry out a comprehensive and systematic literature review on SCS. They
categorise SCS literature in four perspectives:
An intraorganisational perspective
An interorganisational perspective
A combination of both perspectives
An approach, that deliberately ignores security as an issue.
Intraorganisational approaches look at the supply chain from a single company perspective, presenting
conceptual and practical approaches to prevention and response. Interorganisational approaches highlight the
fact that supply chains are rarely managed within a single organisation and require the cooperation of multiple
external parties, including governments. Some authors have highlighted the necessity to combine both
approaches to reach SCS, and others pointed out the fact that some firm may reject taking any proactive
attitude towards SCS, which are perceived to be ineffective and too expensive.
Gould et al. (2010) approach the review systematically but from a thematic point of view, subdividing the
existing literature around three main research areas:
SC efficiency despite security requirements
Dealing with security risks in supply chains
Improving response to a security event.
They also provide a review of the definition of the concept of SCS and argue that operationalization in SCS is
among the least developed areas in the literature.
Colicchia & Strozzi (2012) approach the literature review combining a systematic review with a citation
network analysis. Although the authors focus on the broader area of supply chain risk management, their
findings are interesting in relation to the SCS literature, which is a subset of the supply chain risk management
literature. They structure their systematic supply chain risk management literature using the approach
illustrated by Denyer & Tranfield (2009) that consists of four categories: context (C), intervention (I),
mechanism (M) and Outcome (O), from the acronym of which it takes its name (CIMO). The resulting
structure of supply chain risk management literature is articulated according to Colicchia & Strozzi (2012) in
four main research areas: complexity and uncertainty (context), practice and tools for supply chain risk
management (intervention), organisation of supply chain risk management process (mechanisms), and
increased supply chain resilience and robustness (outcomes).
A similar approach has been used in this manuscript for the categorisation of container SCS. The structure
used in this literature review is:
Vulnerability and potential for disruptions
Policy, practices and technologies
Organisation and processes
Outcomes
3
In the case of container SCS the context is provided by the vulnerability and potential for disruptions of
container supply chains because of increasing global container movement threats, mostly as a result of
terrorism and piracy. The intervention category groups the literature that addresses practices, policies and
technologies developed to enhance container SCS. The literature that focuses on how container SCS is likely
to affect organisations and how organisations interact with each other, has been grouped under mechanisms.
Under outcomes we collected the research contributions that investigate the possible outcomes of container
SCS practices, such as decrease in vulnerability and disruptions but also cost increases.
3.
Vulnerability and potential for disruptions
3.1. Increasing vulnerability
In recent years, globalization and growth in seaborne trade have increased the vulnerability of supply chains to
a series of international criminal activities that threaten the global movement of goods and may have
significant impacts on economic activity and world trade. Piracy, people and drug trafficking, weapons
smuggling, information security and, after the events of 11 September 2001, terrorism are all recognized as
threats for supply chain security (see, among others, Closs & McGarrell, 2004; Lu, Chang, Hsu, & Metaparti,
2010; Thai, 2009; Van de Voort & O'Brien, 2003). A brief synthesis of literature related to threats in maritime
supply chain is provided in this section, divided into two main areas dealing with piracy and terrorism.
3.1.1. Piracy and maritime robbery
Maritime piracy is defined by the United Nations Convention of the Law of the Sea as “any criminal acts of
violence, detention, or depredation committed for private ends by the crew or the passengers of a private ship
that is directed on the high seas against another ship, or against people or property on board a ship”.
Although this definition is recognized in international law and accepted by the International Maritime
Organization (IMO), several authors argued that it is inadequate, limiting the offence to the high seas (Bendall,
2010; Dillon, 2005; Marlow, 2010). In order to overcome the distinctions between high seas and territorial
waters, the International Maritime Bureau (IMB) has provided a wider definition of piracy which includes
maritime crimes in territorial waters but which is not recognized in international law.
Even if it is generally accepted that factors inspiring piracy have their origin in economic reasons (Talley,
2008), recently a nexus between piracy and terrorism, where pirates are also terrorist with ideological reasons,
has been established (Bird, Blomberg & Hess, 2008; Fawcett, 2010; Garmon, 2002).
Data on piracy events are usually available from reports provided by maritime organizations (e.g. IMO and
IMB), however these statistics should be read with care because many events result unreported. In fact, many
shipping companies prefer to cover any losses out of their own resources rather than report the event and
suffer delays and additional insurance cost (Marlow, 2010) and often there is no discrimination between major
and minor attacks (Bateman, 2010; Chalk, 2009; Fawcett, 2010). These reports, however, show that
undoubtedly acts of piracy are increasing in the last years and the most pirate-ridden area at this time are the
coast of East Africa, the Gulf of Aden and nearby waters of the Indian Ocean (Axe, 2009; Fawcett, 2010;
Hanson, 2009; Middleton, 2009; Murphy, 2010; Schiemsky, 2009; Waldron &Kimball, 2008; Wilson, 2009).
The hotspot for piracy and maritime robbery has shifted from Indonesia to Somalia, but there has also been a
worrying increase in the number of pirate attacks in the southern part of the South China Sea (Chow, 2009).
Literature dedicated to maritime piracy includes mainly legal review (see, among the most recent, Hong et al.,
2010; Kraska & Wilson, 2009) and descriptive studies (see, among others, Bateman, 2009; Bateman, 2010;
Fawcett, 2010; He, 2009; Ho, 2009; Murphy, 2010; Nakamura, 2009; Onuoha, 2009; Shih et al., 2010). These
studies analyse the problem of maritime piracy and in many cases suggest measures for abating or containing
it. Improved governance onshore, improvement of local security forces, cooperation between foreign navies
engaged on counter-piracy operations and maritime law enforcement are among the most cited security
measures proposed.
4
A limited number of studies deals with analysis aimed at investigating the economic effects of piracy. Mejia et
al. (2009) perform an econometrical analysis identifying the types of vessels most likely being attacked by
modern pirates. Whereas (Bendall, 2010; Fu et al., 2010; Van der Meijden, 2008) investigate the impact of
maritime piracy on supply chains due to the re-routing of liner service in the attempt to avoid areas with high
piracy-risk, their findings highlight that even from a pure economic point of view, more efforts should be
dedicated by International authorities to contain the piracy problem.
3.1.2. Terrorism
Maritime terrorism is defined as “…the undertaking of terrorist acts and activities within the maritime
environment, using or against vessels or fixed platforms at sea or in port, or against any one of their
passengers or personnel, against coastal facilities or settlements, including tourist resorts, port areas and
port towns or cities” (CSCAP - Council for Security Cooperation in the Asia Pacific). Marlow (2010) expands
this definition to include the use of the maritime sector to smuggle terrorist materials or personnel into a
country.
Several authors observe that attacks aimed at disturbing the container supply chain have the potential of
creating global chaos in that supply chain (Anderson, 2002; Chang, Chen, Lin, & Lin, 2008), but are less
likely to inflict a high number of casualties (Van de Voort & O'Brien, 2003). On the basis of this consideration,
Van de Voort & O'Brien (2003) propose a clear distinction in threat analysis between terrorists who want to
target the maritime sector and terrorist who use the maritime sector to import/export terrorism, stating that
threats are fundamentally different and require different solutions.
Even if maritime history reports terrorist activities prior to 2001, it is only after the events of 11 September
2001 that the awareness of terrorist actions has undoubtedly risen (Sheffi, 2001). In fact, the first phase after
the 9/11 was characterized by heightened security threat perception (Metaparti, 2010) during which several
regulatory measures (Bichou et al., 2007; Hintsa et al., 2009; Yang, 2010; Yang, 2011;) have been quickly
introduced with the aim of enhancing maritime security. However, in some cases, the quick adoption
prevented a complete examination of threats and responses resulting in security gaps (Marlow, 2010;
Metaparti, 2010). Several studies state that security measures required by regulations should be determined
only after appropriate risk assessment evaluations and economic considerations: any measures which cost
more than resulting benefits should be discarded (Gkonis & Psaraftis, 2010; Marlow, 2010; Prentice, 2008).
4.
Policy, practices and technologies
4.1. Policy
In the second half of the 20th century maritime security regulation has been moved to the top of the policy
agenda. The need for increasing security measures in the maritime sector is founded on its high degree of
vulnerability and in its crucial role for international trade: any disruption of the maritime supply chain could
have drastic effects for the global economy. Since September 2001 governments, international organizations,
customs and private firms have undertaken multiple types of responses and actions to enhance supply chain
security (World Bank, 2009). Several studies provide a summary of existing initiatives, divided into voluntary
programs and mandatory regulations (Hintsa et al., 2009) or distinguishing among international security
measures (e.g. International Ship and Port facility Security - ISPS code, International Maritime Organization –
IMO code, International Labour Organization – ILO code, World Customs Organization framework, etc.),
National initiatives (e.g. Container Security Initiative - CSI, 24-hour Rule, Customs-Trade Partnership against
Terrorism C-TPAT, etc.) and Industry programs (e.g. ISO initiatives) (see, among others, Bichou et al., 2007;
Marlow, 2010; Metaparti, 2010; Yang 2010, 2011). A detailed review of security initiatives is provided by
UNCTAD (2004) and OECD (2004).
The urgency of reinforcing security regulations has lead to a confused regulatory framework characterized by
many initiatives not always coordinated and not derived from a process of negotiation and coordination
5
among the multiple players involved (Helmick, 2008; Papa, 2013). This great variety of initiatives has been
justified by the need to establish a multi-layer regulatory system in the attempt to fill potential security gaps
(Flynn & Flynn, 2004; Willis & Ortiz, 2004), however, a closer analysis of the concrete security measures
show that there are several areas in which they overlap or at least are interconnected (Bichou, 2008; Helmick,
2008; Hintsa et al., 2009; Metaparti, 2010; Papa, 2013).
(Hintsa et al. 2009; Metaparti, 2010) in their studies state that a gap exists between theoretical supply chain
security studies, emerging security standards and practical actions. Several solutions are proposed to
overcome this gap. The academic community may overcome this gap via pragmatic case studies within real
world supply chains (Hintsa et al., 2009). Whereas according to Metaparti (2010) this gap may be overcome
reducing excessive bureaucratization, increasing International cooperation and making security integral to
other activities of business.
Currently, the features of the maritime security policies vary from country to country. For example, (Papa,
2013) analyses the United States and the European Union approaches on maritime security observing that
while US have adopted a series of initiatives aimed at ensuring internal security, Europe Union is more
oriented towards a strategy aiming at balancing security needs with the minimization of their negative impacts.
An analysis of European policies in maritime security is given also in Pallis & Vaggelas (2007).
The fragmented initiatives taken until now are not suitable with the internationalized nature of maritime sector
and encourage the creation of an overregulated and bureaucratic scheme. The possibility in the future of
identifying a competent international organization which could act as regulatory authority for maritime
security at international level may allow to overcome the limits of the current fragmented regulatory
framework (Allen, 2008; Papa, 2013).
4.2. Best practices and existing models
Although many studies have focused on supply chain security (Banomyong, 2005; Yang, 2011), relatively few
have empirically investigated the effect of supply chain security initiatives on supply chain performance and
the relationship between security management and operating performance (Bennett & Chin, 2008; Yang &
Wey, 2013; Voss et al., 2009). Among the most recent, Yang & Wey (2013) have focused on the effect of
security management on security performance in the container shipping sector in Taiwan, empirically
identifying crucial security management factors and examining their effect on security performance.
In fact, although several security initiatives had been introduced during the past years, currently there is little
empirical evidence about their impacts for the companies that have implemented them. Among the few works
available in this regard we can cite (Gutierrez et al., 2007; Gutierrez et al., 2006; Martens et al., 2011; Talley
& Lun, 2012; Yang, 2010, 2011). Gutierrez et al. (2007; 2006) analyse the impact generated by BASC
(Business Alliance for Security Commerce), a private voluntary security programme created in Latin America,
for the companies that have implemented it. Authors, through a questionnaire survey answered by BASC
member companies, identify which supply chain security standards have been implemented by BASC
companies, detect the most and the least efficient security measures implemented and provide a qualitative
analysis of the cost and effectiveness of security measures implemented. Talley & Lun (2012) investigate the
effect of security inspections on the quality of the port’s interchange services and, through an empirical
analysis based on a e-questionnaire, find that an increase in security measures can also result in improvements
in the quality of container port interchange service. Yang (2010, 2011) investigates through an empirical
evaluation, based on data collected by questionnaire survey and a risk management matrix, the impact of risk
factors from the Container Security Initiatives on Taiwan’s shipping industry and provide several risk
management alternatives for shipping industry. Whereas Martens et al. (2011) use multiple regression analysis
to investigate the antecedents to supply chain effectiveness.
Another area of empirical studies in maritime security is represented by works that propose management
framework with the aim of ensuring at the same time operating efficiency and compliance with regulations
(Bichou et al., 2007a-b; Bichou & Evans, 2007; Bichou, 2004; Thai, 2009). Bichou et al., (2007a-b) propose a
6
conceptual framework for managing quality in the context of maritime security regulations and state that
current regulatory requirements can be implemented in line with the principles of quality management,
satisfying at the same time legal requirements and operational aims. Specifically, they discuss the application
with a shipping company of a 10-step conceptual quality management framework to implement the 24-hour
Advance Vessel Manifest Rule. Bichou (2004) proposes a conceptual framework to port security integrating
and optimizing three initial models relating, respectively, to channel design and process mapping, risk
assessment and management, and cost control and performance monitoring. Thai (2009) investigates how to
enhance security while not putting at risk organizational efficiency and effectiveness and proposes a
conceptual model of effective maritime security, including 13 dimensions and 24 associated critical success
factors. The author suggests that managers can use the model to develop a checklist of essential components
for their company’s security management policies.
These empirical studies may represent a roadmap for the future of maritime sector to formulate quality
standards so that the requirements of both regulators and customers can be equally satisfied.
4.3. Technologies
Considering the costs and complexity associated with increasing maritime security, it is to be expected that
efforts have been made to reduce such costs by means of new technologies. SCS technologies can be
subdivided on the basis of the purposes that such technologies have and can be grouped in monitoring,
prevention and forecasting.
Monitoring technologies are those aiming at increasing the visibility of the chain or at the facilities and at
reducing thereby the risk of malicious interference with the cargo or at certain facilities. Typical examples of
monitoring technologies are cameras and RFID tags. A large amount of literature has emerged on the
effectiveness of RFID tagging (Sarac, Absi, & Dauzère-Pérès, 2010) or have focused on the benefits of such
technology (e.g. Chin & Wu, 2004; Huang, Lee, & Gong, 2012; Rizzo, Barboni, Faggion, Azzalin, & Sironi,
2011; Roberti, 2005)
Prevention technologies can be used to prevent interference with the chain and ensure full visibility of the
various parties involved. RFID has also such function, but in this are we can include fencing and data
management technologies. Container scanning by means of x-rays, gamma ray, and pulsed neutron scanners is
now available (Frankel, 2005).
Seals have also become a valuable aid in preventing interference with the container. But, as noted by Frankel
(2005), “The principal container security issue is: what has been loaded into the container? not what does
someone say was loaded in the container, and not whether the seal on the container is intact.” Frankel
recommends the use of technologies that allow, without opening the container, to inspect its contents, as the
nature itself of the container, that is not used on closed or dedicated services does not allow any other form of
reliable security technology to be particularly effective.
Apart from the evident benefits of better insight on what the contents of containers are, a combination of
various systems might in the end be the most appropriate solution, and indeed, container security technologies
are moving towards a combination of various systems employed simultaneously. The literature seems to
advise for intelligent container seals, or pre-scanning, that allow identifying suspicious containers, that can be
then scanned, non intrusively with x-rays or gamma-rays, or opened if necessary (Bakshi, Flynn, & Gans,
2011; Frankel, 2005).
One of the main issues related to inspections is the inefficiency deriving from the necessary limited capacity
of scanners and inspectors (Bichou, 2004; Kumar & Vellenga, 2004; Yeo, Pak, & Yang, 2013). Acceptance of
security measures is also important but only a handful of research contributions addressed such issue (Chao &
Lin 2009).
7
Among the forecasting technologies this review considers the various methods that are used to assess the
impacts of supply chain disruptions. This area of research overlaps with the models developed to maximise
supply chain performance by means of simulation or other OR techniques. Without broadening the scope of
the review too much it is worth mention the book by Bichou, Bell & Evans (2007) where various
contributions investigate by means of forecasting and simulation the impacts of various approaches to assess
resilience of networks.
5.
Organisation and processes
Several studies have focused on the organisational and managerial aspects relevant for maritime SCS. The
focus of this section is to highlight the mechanisms that allow certain practices to be successful in terms of
increasing maritime SCS. In order to structure such analysis we proceed by discussing the mechanisms that
have focused on the individual components of the maritime chain and then on those that have focused on the
complete supply chain. As far as the specific maritime supply chain components we will limit the review to
the literature on ports, the shipping segment and the interfaces with hinterland transport and logistics systems,
such as rail, road and inland waterways. When looking at the complete maritime supply chain we will follow
the approach of Williams et al. (2008) and consider the intraorganisation, interoganization and combined
perspective.
5.1. Security of single maritime supply chain components
Yang & Wei (2013) distinguish between separate risk elements in container supply chains, namely: cargo,
vessels, ports, people, information and financing. As discussed in the previous section, existing security
initiatives, such as ISPS and the C-TPAT have different focus areas and aim at addressing security concerns
arising from various risk elements. Some of these interventions focus on the cargo, while other on the port or
the vessel. Most of the literature surveyed focused on chain mechanisms but does not discuss in detail how the
initiatives will impact the individual risk elements. Frankel (2005) reviews the developments of maritime
supply chain security highlighting the importance of technology and the impacts of various initiatives on
tightening maritime supply chain security.
Several contributions have addressed maritime security mechanisms that impact trade, although the focus has
been mostly on US led initiatives, such as the container security initiative (CSI) discussed above. Other
studies (Bichou & Evans, 2007) have focused on shipping and in particular vessel network resilience for
supply chain security risks reduction. These studies though appear more applications of simulation or network
analysis, where the security issues are only instrumental to show the value of the network simulation models.
As far as ports are concerned Yang (2010) illustrates how the ISPS code impacts the Keelung Port in Taiwan.
Lirn & Whang (2010) focus on the Kaoshung port also in Taiwan. Bakshi et al. (2011) analyse the impact of
alternative scanning procedures in terms of congestion in two large container ports, highlighting that, while
full 100% scanning will not be feasible, a combination of pre-scanning with more detailed inspections would
reduce the costs and inefficiencies deriving from congestion. Bichou (2011) analyses a panel of 470 container
terminals and observes that security impacts on operational efficiency, although the relevance of such effects
depends substantially on the type of regulation and terminal. There is evidence though that targeted
inspections focusing only on those containers that appear suspicious as a result of cargo pre-screening would
greatly benefit the efficiency and effectiveness of security operations in port. A large part of the literature
(Lewis, Erera, & White, 2003; Y. Yang, 2010; Yeo, Pak, & Yang, 2013) has focused on optimization of port
and terminal links under security threats or with the objective of assessing the resilience of the system.
Very few papers have focused on the links between port and maritime security and the hinterland
transportation networks (Schilk, Blumel, Recagno, & Boevé, 2007). Schilk et al. (2007) highlight how
security at a chain level for European transport requires further work both in terms of the policy and
organisational concepts. They argue that while for the maritime segment, including ports, policy and practices
are well underway, for hinterland transportation little directions exist with reference to hinterland
8
transportation (road, rail and inland waterways) and recommend the development of innovative security
strategies and concepts combining maritime with hinterland transport to crate seamless security processes.
Some studies have also assessed data information requirements for security such as Chao & Lin (2009),
highlighting how security perception affects the adoption of new technologies. This area, though, still require
further analysis.
5.2. Security mechanisms at a supply chain level
As mentioned in the introduction, extensive literature has emerged in the area of SCS (Williams, Lueg, &
LeMay, 2008), but not in particular on maritime supply chains (Yang & Wei, 2013; Frankel, 2005). Following
Williams et al. (2008) in the case of maritime supply chains we can use three perspectives; the
intraoriganisational perspective, focuses on the mechanisms that can be used by SCS within an organisation,
with respect to those organisational functions such as marketing, purchasing and distribution. A supply chain
security orientation is considered important for successful security practices (Autry & Bobbitt, 2008), and this
includes information exchanges with external partners (Russell & Saldanha, 2003).
These approaches tend to focus on prevention and response measures that can be adopted within an
organisation. Considering that the maritime supply chain typically require the involvement of several parties,
an intraorganisational perspective to maritime supply chain security appears insufficient. Sheffi (2001)
suggest that leveraging relationships with suppliers and governmental agencies is necessary to improve SCS
and supply chain continuity. Several authors suggest that these partnerships should include governmental
agencies as well as private firms (Prokop, 2012; Russell & Saldanha, 2003; Sheffi, 2001).
As supply chains have become more integrated they have shifted from exclusively intraorganizational
coordination to coordination with other external organizations involved in the flow of product, information,
and finances from raw material to end consumer. It would be valuable to investigate whether security
initiatives are better handled by integrated ocean carriers, non-vessel operating common carriers (NVOCC), or
freight forwarders. An increasing role of SCS could at least in theory favour integrated carriers.
In a recent review (Gould, Macharis, & Haasis, 2010), four main mechanisms are identified for dealing
strategically and operationally with SCS issues, specifically terrorisms, and impacts and costs of compliance.
Firstly, communications among suppliers appear to be critical (Autry & Bobbitt, 2008), which is also
beneficial in improving information sharing among supply chain partners (Peleg-Gillai, Bhat, & Sept, 2006).
A second strategy involves the development of a framework for security based on adherence to regulation
(Gould, Macharis, & Haasis, 2010), and includes QM approaches (Bichou, Lai, Lun, & Cheng, 2007a; Bichou,
Lai, Lun, & Cheng, 2007b; Lee & Whang, 2005).
A third strategy entails a reorganization of logistics operations and warehousing to reduce dependence on
overseas sourcing, but also securing alternative suppliers and increasing inventories (Sheffi, 2001). Ensuring
that alternative transport modes are available is one of the suggestions made by Russell and Saldanha (2003).
A fourth strategy refers to the development of mitigation measures to build up flexibility and resilience.
Flexibility is often traded off for efficiency gains, e.g. by reducing inventories, but it can be maintained if
alternative avenues are available to perform business and processes, transportation and access distribution
facilities (Autry & Bobbitt, 2008; Russell & Saldanha, 2003). Resilience on the other hand is the ability of a
system to recover after a disruption or a security incident, or in other words as the ability of the supply chain
to return to normal standards of operations following a failure in one or more of its components (Willis &
Ortiz, 2004).
9
6. Outcomes
6.1. Costs and benefits
Is fairly well known that implementing security measures may lead to extra costs and delays and result in
potential liabilities (Chang, Chen, Lin, & Lin, 2008; Kumar & Vellenga, 2004). Several attempts have been
made to calculate the cost impacts and financial implications of the introduction of new security regulations.
For example, a summary of ISPS cost estimates as calculated by various regulatory risk assessment tools is
reported in Bichou & Evans (2007). HPC (2010) provides an evaluation of the impact of additional terminal
operations required for 100% scanning of containers in terms of investments and operation costs necessary to
perform the additional terminal operations. Whereas the results of a global study based on a questionnairesurvey conducted by UNCTAD (2007) in the attempt to acquire a better understanding of economic
implications of security measures are presented in Benamara & Asariotis (2007).
Quantify the economic impact of maritime security measures is difficult and subjects involved are
traditionally reluctant in sharing sensitive information. Brooks & Button (2006) in their work try, through
interviews with cargo operators, to investigate the economic impacts of security regulations from a cargo
interest perspective. Banomyong (2005) explores some of the financing implications of the security initiative,
distinguishing two possible sources for financing container security initiatives: payment by users and public
sources.
6.2. Security as a source of competitive advantage
One of the most relevant outcomes of maritime security is that it can contribute to generate competitive
advantage. Although so far most firms have seen security as a cost element, mostly as a result of the focus on
direct expenses following security initiatives (Peleg-Gillai, Bhat, & Sept, 2006), there is increasing evidence
that collateral benefits can be obtained through maritime SCS. Among these, Peleg-Gillai et al. (2006)
indicate:
Higher supply chain visibility;
Improved supply chain efficiency;
Better customer satisfaction;
Improved inventory management;
Reduced cycle time and shipping time; and
Cost reduction following the above-mentioned collateral benefits.
If looked in this sense, then supply chain investment contributes then positively to the competitive position of
the firm and is not only a cost.
In the specific case of maritime transport, voluntary logistics security programs, such as C-TPAT, by
improving collaboration among logistics service providers, shippers and carriers can bring substantial
improvements to the chain. Maritime supply chain security can be then interpreted as a parameter of quality of
service, and take advantage of the concepts developed in the “total supply chain” approach (Sheu et al., 2006).
This change in perspective is particularly important as a supply chain that is based on strong relationships will
be the supply chain that is more likely to be effective, efficient, and relevant (Bowersox et al., 1999)
7.
Conclusions and directions for further research
This paper presented an updated literature review centred on the maritime and container supply chain security,
mostly on articles appeared since 2007. The review is structured in four parts:
Contributions related to vulnerability and potential for disruptions;
Contributions on policy, practices and technologies;
Contributions on organisation and processes; and
Contributions on the outcomes of maritime supply chain security initiatives.
10
From this review the following observations can be made. Maritime supply chain security is an important
research area, and considering the strategic role of maritime transport and container shipping on international
trade, as well as the transnational nature of container shipping, would deserve more attentions from
practitioners and researchers. There seem to be sufficient analysis on the antecedents of maritime supply chain
security (e.g. terrorisms and piracy) although most of these contributions are theoretical and qualitative. Less
attention has been dedicated to pilferage and smuggling activities among the main reasons for improving
container security.
Several contributions have focused on policy, technologies and best practices. Also in this case most of the
analysis is of a theoretical and qualitative nature. Systematic reviews of security practices and cross sectional
studies are by the nature of the subject difficult, but surveys can provide a wealth of information (e.g. Bichou
et al., 2007). Furthermore as far as the initiatives are concerned, most literature made use of simulation and
analytic methods that focus on liner shipping network reliability and container terminals, few on ports a whole,
and only a handful on the interfaces between ports and other modes of transport (Schilk, Blumel, Recagno, &
Boevé, 2007), or overall on the total maritime supply chain (Barnes & Oloruntoba, 2005).
As far as processes and organisation studies, there is substantive literature on ports and to some extent on
maritime networks. Few studies have addressed organisational issues in maritime and terminal operators from
an organisational point of view. Also in this case further empirical analyses would be useful. This is
interesting as a large number of contribution I the broader area of supply chain security makes use of surveys
and has been able to provide useful recommendation in the industry on the evaluation of existing inter- and
intraorganisational practices. A useful avenue for expanding research would be to investigate the applicability
of some of the main findings in the SCS literature to shipping, ports and in general maritime supply chains.
References
Allen, C. H., (2008). The International supply chain security regime and the role of competent international
organizations. In: Legal Challenges in Maritime security. Edited by Myron H. Nordquist.
Anderson, P. L. (2002). Lost earnings due to the west coast port Shutdown–Preliminary estimate. Anderson
Economic Group, 1.
Autry, C. W., & Bobbitt, L. M. (2008). Supply chain security orientation: Conceptual development and a
proposed framework. International Journal of Logistics Management, the, 19(1), 42-64.
Axe, D. (2009). Defeating Somali pirates on land: The Kenya connection. US Naval Institute Proceedings,
135. (3) pp. 1,273.
Bakshi, N., Flynn, S. E., & Gans, N. (2011). Estimating the operational impact of container inspections at
international ports. Management Science, 57(1), 1-20.
Banomyong, R. (2005). The impact of port and trade security initiatives on maritime supply-chain
management. Maritime Policy & Management, 32(1), 3-13.
Barnes, P., & Oloruntoba, R. (2005). Assurance of security in maritime supply chains: Conceptual issues of
vulnerability and crisis management. Journal of International Management, 11(4), 519-540.
Bateman, S. (2009). Increased risks at sea? Global shipping downturn and maritime security. RSIS
Commentaires, 9 October 2009.
Bateman, S. (2010). Maritime piracy in the Indo-Pacific region–ship vulnerability issues. Maritime Policy &
Management, 37(7), 737-751.
Beckman, R. C. (2002). Combatting piracy and armed robbery against ships in southeast Asia: The way
forward. Ocean Development &International Law, 33(3-4), 317-341.
Benamara, H. & Asariotis, R. (2007). ISPS Code implementation in ports: costs and related financing. In:
Bichou, Bell and Evans (ed.), Risk Management in Port Operations, Logistics and Supply-Chain
Security, London, Informa, 2007, 281-301. ISBN 978-1-84311-655-4
Bendall, H. B. (2010). Cost of piracy: A comparative voyage approach. Maritime Economics & Logistics,
12(2), 178-195.
Bennett, A. C., & Chin, Y. Z. (2008). 100% container scanning: Security policy implications for global supply
chains. Massachusetts Institute of Technology, Engineering Systems Division.
11
Bichou, K. (2004). The ISPS code and the cost of port compliance: An initial logistics and supply chain
framework for port security assessment and management. Maritime Economics and Logistics, 6 4, 322348.
Bichou, K. (2008). Security and Risk-Based Models in Shipping and Ports: Review and Critical Analysis.
Joint Transport Research Centre, Discussion Paper N. 2008-20,December 2008.
Bichou, K. (2011). Assessing the impact of procedural security on container port efficiency. Maritime
Economics & Logistics, 13(1), 1-28.
Bichou, K., & Evans, A. (2007). Maritime security and regulatory risk-based models: Review and critical
analysis. In K. Bichou, M. G. H. Bell & A. Evans (Eds.), Risk management in port operations, logistics
and supply chain security. London: Informa.
Bichou, K., Bell, M. G., & Evans, A. (2007). Risk management in port operations, logistics and supply chain
security. London, Informa.
Bichou, K., Lai, K., Lun, Y. V., & Cheng, T. (2007a). A quality management framework for liner shipping
companies to implement the 24-hour advance vessel manifest rule. Transportation Journal, 5-21.
Bichou, K., Lai, K., Lun, Y. V., & Cheng, T. E. (2007b). Managing security through quality management: A
case study to implement the 24-hour rule in a liner shipping company. In K. Bichou, M. G. H. Bell &
A. Evans (Eds.), Risk management in port operations, logistics and supply chain security (pp. 235252). London: Informa.
Bird, G., Blomberg, S. B., & Hess, G. D. (2008). International terrorism: Causes, consequences and cures. The
World Economy, 31(2), 255-274.
Brooks, M. R., & Button, K. J. (2006). Maritime container security: A cargo interest perspective.
International Workshop on Risk Management in Port Operations and Logistics and Supply Chain
Security, London, 29.
Chalk, P. (2009). Maritime Piracy: Reasons, Dangers and Solutions. Available at
http://www.rand.org/content/dam/rand/pubs/testimonies/2009/RAND_CT317.pdf
Chang,
C.
C.,
Chen,
S.
Y.,
Lin,
K.,
&
Lin,
S.
T.
(2008).
Developing higher maritime security quality for us bound trades. Proceedings of the International
Association of Maritime Economists (IAME) Annual Conference, Dalian, PR China.
Chang, Y. W. (2012). Risk analysis of cargos damages for aquatic products of refrigerated containers:
Shipping operators’ perspective in Taiwan. Risk Analysis, 4(2), 86-94.
Chao, S., & Lin, P. (2009). Critical factors affecting the adoption of container security service: The shippers’
perspective. International Journal of Production Economics, 122(1), 67-77.
Chin, L., & Wu, C. (2004). The role of electronic container seal (E-seal) with RFID technology in the
container security initiatives. MEMS, NANO and Smart Systems, 2004. ICMENS 2004. Proceedings.
2004 International Conference on, pp. 116-120.
Chow J., 2009. Sea piracy hits five-year high in waters near Singapore: worst affected vessels are tankers and
large container ships. The Straits Times, 21 September 2009.
Cigolini, R., Pero, M., & Poloni, M. (2012). Reinforcing supply chain security through organizational and
cultural tools. Managing the Future Supply Chain: Current Concepts and Solutions for Reliability and
Robustness, , 201.
Closs, D. J., & McGarrell, E. F. (2004). Enhancing security throughout the supply chain IBM Center for the
Business of Government.
Colicchia, C., & Strozzi, F. (2012). Supply chain risk management: A new methodology for a systematic
literature review. Supply Chain Management: An International Journal, 17(4), 403-418.
Daschkovska, K., & Scholz-Reiter, B. (2011). How can electronic seals contribute to the efficiency of global
container system? Dynamics in Logistics, , 457-467.
Dillon, D. R. (2005). Maritime piracy: Defining the problem. SAIS Review, 25(1), 155-165.
Donner, M., & Kruk, C. (2009). Supply chain security guide. The International Bank for Reconstruction and
Development/The World Bank,
European Conference of Ministers of Transport, & Development. Maritime Transport Committee. (2005).
Container transport security across modes OECD Publishing.
Fawcett, J. A. (2010). Challenges to apprehension and prosecution of east African maritime pirates. Maritime
Policy & Management, 37(7), 753-765.
Flynn, S., & Flynn, S. E. (2004). America the vulnerable: How our government is failing to protect us from
terrorism. Harper.
12
Frankel, E. G. (2005). Maritime security, management, technology and impact on maritime operations and
economics. Paper presented at the Proceedings of the IAME Annual Conference, Limassol, Cyprus.
Fu, X., Ng, A. K., & Lau, Y. (2010). The impacts of maritime piracy on global economic development: The
case of Somalia. Maritime Policy & Management, 37(7), 677-697.
Garmon, T. (2002). International law of the sea: Reconciling the law of piracy and terrorism in the wake of
September 11th. Tul.Mar.LJ, 27, 257.
Gkonis, K. G., & Psaraftis, H. N. (2010). Container transportation as an interdependent security problem.
Journal of Transportation Security, 3(4), 197-211.
Gould, J. E., Macharis, C., & Haasis, H. (2010). Emergence of security in supply chain management literature.
Journal of Transportation Security, 3(4), 287-302.
Gutierrez, X., & Hintsa, J. (2006). Voluntary supply chain security programs: A systematic comparison. Paper
presented at the The International Conference on Information Systems, Logistics and Supply Chain,
Lyon, France, Lyon, France.
Gutiérrez, X., Hintsa, J., Wieser, P., & Hameri, A. (2007). Voluntary supply chain security program impacts:
An empirical study with BASC member companies. World Customs Journal, 1(2), 31-48.
Hall, P. V. (2004). “We’d have to sink the ships”: Impact studies and the 2002 west coast port lockout.
Economic Development Quarterly, 18(4), 354-367.
Hanson S., 2009. Backgrounder: combating maritime piracy. Council on Foreign relations.
Haralambides, H. E., & Londono-Kent, M. P. (2004). Supply chain bottlenecks: Border crossing inefficiencies
between mexico and the united states. International Journal of Transport Economics, 31 2, 183-95.
Hawkes, K. G. (1989). Maritime security
He, R. (2009). Coast guards and maritime piracy: Sailing past the impediments to cooperation in Asia. The
Pacific Review, 22(5), 667-689.
Helmick, J. S. (2008). Port and maritime security: A research perspective. Journal of Transportation Security,
1(1), 15-28.
Hintsa, J., Gutierrez, X., Wieser, P., & Hameri, A. (2009). Supply chain security management: An overview.
International Journal of Logistics Systems and Management, 5(3), 344-355.
Ho, J. (2009). Combating piracy and armed robbery in Asia: The ReCAAP information sharing centre (ISC).
Marine Policy, 33(2), 432-434.
Ho, J. (2009). Recovering after a maritime terrorist attack: The APEC trade recovery programme. Marine
Policy, 33(4), 733-735.
Hong, N., & Ng, A. K. (2010). The international legal instruments in addressing piracy and maritime
terrorism: A critical review. Research in Transportation Economics, 27(1), 51-60.
Hong, N., & Ng, A. K. Y. (2010). The international legal instruments in addressing piracy and maritime
terrorism: A critical review. Research in Transportation Economics, 27(1), 51-60.
HPC Hamburg Port Consulting GmbH, Planco Consulting GmbH, Ocean Shipping Consultants (2010). Study
on the impact of security measures on the EU economy and trade relations. Final report, 2010.
Huang, S., Lee, M., & Gong, D. (2012). Implementing a passive RFID E-seal system for transit container
security: A case study of Kaohsiung port. Advances in Transportation Studies, 26
ICC- IMB. Piracy and Armed Robbery against ships: annual report.
International Maritime Bureau Piracy Reporting Centre, 2010, Report on Piracy and Armed Robbery against
Ships. International Maritime Bureau’s Piracy Reporting Centre, 14/01/2010, Kuala Lumpur.
International Maritime Bureau. Piracy and armed robbery against ships. Annual report 2011.
International Maritime Organization (IMO), Reports on Acts of Piracy and Armed Robbery Against Ships.
International Maritime Organization (IMO), Various dates, reports on acts of Piracy and armed robbery
against ships.
Janssens-Maenhout, G., De Roo, F., & Janssens, W. (2010). Contributing to shipping container security: Can
passive sensors bring a solution? Journal of Environmental Radioactivity, 101(2), 95-105.
Kim, S. J., Deng, G., Gupta, S. K., & Murphy-Hoye, M. (2008). Enhancing cargo container security during
transportation: A mesh networking based approach. Technologies for Homeland Security, 2008 IEEE
Conference on, pp. 90-95.
Kraska, J., & Wilson, B. (2009). Combating pirates of the gulf of Aden: The Djibouti code and the Somali
coast guard. Ocean and Coastal Management, 52(10), 516.
Kumar, S., & Vellenga, D. (2004). Port security costs in the US: A public policy dilemma. Proceedings of the
2004 Conference of International Association of Maritime Economists, Turkey: Izmir,
13
Kumar, S., Jensen, H., & Menge, H. (2008). Analyzing mitigation of container security risks using six sigma
DMAIC approach in supply chain design. Transportation Journal, 47(2), 54-66.
Lam, J. S. L. (2012). Risk management in maritime logistics and supply chains. Maritime Logistics:
Contemporary Issues, , 117.
Lee, H. L., & Whang, S. (2005). Higher supply chain security with lower cost: Lessons from total quality
management. International Journal of Production Economics, 96(3), 289-300.
Lewis, B. M., Erera, A. L., & White, C. C. (2003). Optimization approaches for efficient container security
operations at transshipment seaports. Transportation Research Record: Journal of the Transportation
Research Board, 1822(-1), 1-8.
Lirn, T. C., & Wang, J. H. (2010). The study of threat factors on port risk management: An empirical research
in the Kaohsiung port. Proceedings for International Forum on Maritime Security, Keelung, Taiwan.
pp. 93-118.
Longo, F. (2012). Supply chain security: An integrated framework for container terminal facilities.
International Journal of Simulation and Process Modelling, 7(3), 159-167.
Lu, C., Chang, C., Hsu, Y., & Metaparti, P. (2010). Introduction to the special issue on maritime security.
Maritime Policy & Management, 37(7), 663-665.
Lun, Y. V., Wong, C. W., Lai, K., & Cheng, T. (2008). Institutional perspective on the adoption of technology
for the security enhancement of container transport. Transport Reviews, 28(1), 21-33.
Marlow, P. B. (2010). Maritime security: An update of key issues. Maritime Policy & Management, 37(7),
667-676.
Martens, B. J., Crum, M. R., & Poist, R. F. (2011). Examining antecedents to supply chain security
effectiveness: An exploratory study. Journal of Business Logistics, 32(2), 153-166.
Martin Associates, 2001. An assessment of the impacts of West Coast Container Operations and the potential
impacts of an interruption of port operations.
McLay, L. A., & Dreiding, R. (2012). Multilevel, threshold-based policies for cargo container security
screening systems. European Journal of Operational Research,
Mejia Jr, M. Q., Cariou, P., & Wolff, F. (2009). Is maritime piracy random? Applied Economics Letters,
16(9), 891-895.
Metaparti, P. (2010). Rhetoric, rationality and reality in post-9/11 maritime security. Maritime Policy &
Management, 37(7), 723-736.
Middleton, R. (2009). Pirates and how to deal with them. Chatham House, Africa Programme and
International Law Discussion Group, 22 April 2009.
Murphy M., 2010. Solving Somalia. Proceedings Magazine, July 2010, 136/7/1, 289.
Nakamura, M. (2009). Piracy Off the Horn of Africa: What is the most Effective Method of Repression. Naval
War College Newport, Final report, 04 May 2009.
OECD, (2004). Report on Container Transport Security across Modes. Report by the OECD Transport
Section, Paris.
Onuoha, F. (2009). Sea piracy and maritime security in the horn of Africa: The Somali coast and Gulf of Aden
in perspective. African Security Studies, 18(3), 31-44.
Pallis, A. A., & Vaggelas, G. K. (2007). Enhancing port security via the enactment of EU policies. In K.
Bichou, M. G. H. Bell & A. Evans (Eds.), Risk management in port operations, logistics and supplychain security (pp. 303-334). London: Informa.
Papa, P. (2013). US and EU strategies for maritime transport security: A comparative perspective. Transport
Policy, doi 10.1016/j.tranpol.2012.08.008.
Peleg-Gillai, B., Bhat, G., & Sept, L. (2006). Innovators in supply chain security: Better security drives
business value Manufacturing Institute.
Prentice, B. E. (2008). Tangible and intangible benefits of transportation security measures. Journal of
Transportation Security, 1(1), 3-14.
Prokop, D. (2012). Smart containers and the public goods approach to supply chain security. International
Journal of Shipping and Transport Logistics, 4(2), 124-136.
Rizzo, F., Barboni, M., Faggion, L., Azzalin, G., & Sironi, M. (2011). Improved security for commercial
container transports using an innovative active RFID system. Journal of Network and Computer
Applications, 34(3), 846-852.
Roach, A. (2003). Container and port security: A bilateral perspective. Int'l J.Marine & Coastal L., 18, 341.
Roberti, M. (2005). RFID container seals deliver security, value. The RFID Journal.
14
Romero, J. (2003). Prevention of maritime terrorism: The container security initiative. Chi.J.Int'l L., 4, 597.
Russell, D. M., & Saldanha, J. P. (2003). Five tenets of security-aware logistics and supply chain operation.
Transportation Journal, 44-54.
Sarac, A., Absi, N., & Dauzère-Pérès, S. (2010). A literature review on the impact of RFID technologies on
supply chain management. International Journal of Production Economics, 128(1), 77-95.
Schiemsky B., 2009. Piracy’s rising tide: Somaly piracy develops and diversifies. Defense & Security
Intelligence & Analysis. Available at http://www.janes.com/products/janes/defence-securityreport.aspx?id=1065927651
Schilk, G., Blumel, E., Recagno, V., & Boevé, W. (2007). Ship, port and supply chain security concepts
interlinking maritime with hinterland transport chains. International Symposium on Maritime Safety,
Security and Environmental Protection. Athens (Greece), 20th September,
Sheffi, Y. (2001). Supply chain management under the threat of international terrorism. International Journal
of Logistics Management, the, 12(2), 1-11.
Sheu, C., Lee, L., & Niehoff, B. (2006). A voluntary logistics security program and international supply chain
partnership. Supply Chain Management: An International Journal, 11(4), 363-374.
Shih, Y., Chou, C. L., & Chiau, W. (2010). Maritime safety for fishing boat operations and avoidable
hijacking in Taiwan. Marine Policy, 34(2), 349-351.
Talley, W. K. & Rule, E. M. (2008). Piracy in shipping. In W. K. Talley (eds.), Maritime Safety, Security and
Piracy, pp. 89 – 101. London: Informa LLP.Talley, W. K. (2008). Maritime safety: Security and piracy.
Talley (eds.), London: Informa LLP.
Talley, W. K., & Lun, V. Y. (2012). Port security and the quality of port interchange service. In W. K. Talley
(Ed.), The blackwell companion to maritime economics (pp. 701-716). Chichester, UK:
Wiley‐Blackwell.
Tang, D., Xu, D., Yang, J., & Chen, Y. (2013). Security based operation in container line supply chain: A
literature review. Decision aid models for disaster management and emergencies (pp. 95-115)
Springer.
Thai, V. V. (2009). Effective maritime security: Conceptual model and empirical evidence. Maritime Policy &
Management, 36(2), 147-163.
Thibault, M., Brooks, M. R., & Button, K. J. (2006). The response of the US maritime industry to the new
container security initiatives. Transportation Journal, , 5-15.
UNCTAD 2007, Maritime Security: ISPS Code Implementation, Costs and Related Financing, Geneva:
UNCTAD.
UNCTAD. (2004). Container security: Major initiatives and related international developments. Geneva,
Switzerland: UNCTAD.
United Nations (UN), 1982, United Nations Convention on the Law of the Sea of 10 December 1982.
Van de Voort, M., & O'Brien, K. A. (2003). " Seacurity": Improving the security of the global sea-container
shipping system. Rand Corporation.
Van der Meijden, Leonard Remondus. (2008). The influence of modern piracy on maritime commercial
transport. Unpublished Erasmus University.
Voss, M. D., Whipple, J. M., & Closs, D. J. (2009). The role of strategic security: Internal and external
security measures with security performance implications. Transportation Journal, , 5-23.
Waldron & Kimball, 2008. Why is it so hard to stop the piracy problem?. Maritime reporter. Available at
http://www.blankrome.com/siteFiles/Publications/4B788DB23A18850DDA1E1A224E8E6335.pdf
Williams, Z., Lueg, J. E., & LeMay, S. A. (2008). Supply chain security: An overview and research agenda.
International Journal of Logistics Management, the, 19(2), 254-281.
Willis, H. H., & Ortiz, D. S. (2004). Evaluating the security of the global containerized supply chain. Rand
Corp.
Wilson, B. (2009). Naval diplomacy and maritime security in the western Indian ocean. Strategic Analysis,
33(4), 488-497.
World Bank, (2009). Supply Chain Security Guide.
Yang, C., & Wei, H. (2013). The effect of supply chain security management on security performance in
container shipping operations. Supply Chain Management: An International Journal, 18(1), 74-85.
Yang, Y. (2010). Impact of the container security initiative on Taiwan's shipping industry. Maritime Policy &
Management, 37(7), 699-722.
15
Yang, Y. (2011). Risk management of Taiwan’s maritime supply chain security. Safety Science, 49(3), 382393.
Yeo, G., Pak, J., & Yang, Z. (2013). Analysis of dynamic effects on seaports adopting port security policy.
Transportation Research Part A: Policy and Practice, 49, 285-301.
Zeng, Y., Wang, L., Deng, X., Cao, X., & Khundker, N. (2012). Secure collaboration in global design and
supply chain environment: Problem analysis and literature review. Computers in Industry.
16