Building an Expert-System for Maritime Container Security Risk Management
نویسندگان
چکیده
Until lately, transportation risk management has mostly dealt with natural or man-made accidental disasters. The September 11th tragedy has made transportation operators, as well as shippers and public authorities, aware of a new type of risk, man-made and intentional. Securing global transportation networks has become an important concern for governments, practitioners and academics. In the current time-based competition context, securing transportation operations should not be sought at the expense of time effectiveness in physical and informational flow processing. In this paper, the authors describe a project for the design of an expert-system dedicated to maritime container security risk management, present a literature review on decision-support systems dedicated to transportation risk management, and discuss the various steps of expertise modeling in a transportation risk management context. aware of a new type of risk, still man-made but this time intentional (Abkowitz, 2003). Securing the global transportation networks has thus become an important concern for governments, practitioners and academics, and all the more so as: 1) Beyond terrorism-related risks, lie numerous other intentional man-made transportation risks such as drug smuggling or tax avoidance: e.g., “South African ports face a relatively low risk of international terrorist attack, but high incidences of illegal DOI: 10.4018/jal.2011010103 36 International Journal of Applied Logistics, 2(1), 35-56, January-March 2011 Copyright © 2011, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited. human movements through stowaways and trafficking as well as smuggling of illegal substances” (Maspero, Van Dyk, & Ittmann, 2008). 2) In a widely spread time-based competition context, securing transportation operations should not be sought for at the expense of delay effectiveness in physical and informational flow processing: e.g., “the WCO passed a unanimous resolution in December 2007, expressing concern that implementation of 100 percent scanning would be detrimental to world trade and could result in unreasonable delays, port congestion, and international trading difficulties” (Caldwell, 2008). In the past 5-6 years, various initiatives have been launched reflecting this concern (Bichou, Bell, & Evans, 2007) for a detailed presentation of these initiatives), as “Governments and industry have all responded with proposals to create more confidence in supply chain security, while maintaining smooth flows of goods and services in a global supply chain” (Lee & Whang, 2005): • As from 07/01/2004, the International Ship and Port facility Security (ISPS) Code launched by the International Maritime Organization (IMO), aims at detecting security threats, assessing security and ensuring that adequate measures are in place, based on collection and exchange of security information and the establishment of roles and responsibilities in the risk management process. • The Container Security Initiative (CSI) has been designed in 2002 by the US Customs and Border Protection (CBP) Administration to identify potentially high-risk containers and evaluate the risk actually brought by these containers before they are shipped to the US, using such screening devices as X-ray scanners. • Adopted in 2003, the SAFE Framework of Standards to Secure and Facilitate Global Trade is World Customs Organization’s initiative to promote security and facilitation standards for international trade, security-centric networking between national customs administrations, and, through the Authorized Economic Operator (AEO) concept, a cooperation between customs and business operators likable to the US CTPAT (Customs-Trade Partnership Against Terrorism) program. Academics and practitioners have also begun addressing this topic. Following an informal and rather natural thread, • Some authors have contributed to the definition of the concept of supply chain risk management (Juttner, Peck, & Christopher, 2003) and have defined this concept as “the identification and management of risks for the supply chain, through a coordinated approach amongst supply chain members, to reduce supply chain vulnerability as a whole”; • Other academic writers have looked into the sources of risk for the supply chain: e.g. based on the robust classification of risks into three types (environmental, organizational and network-relates), Das and Teng (1998) have identified the first two uncertainties as sources of risk to the members of the supply chain, whereas network-related uncertainties would be sources of risk arising from these members. • An important body of literature is dealing with the risk assessment dimension of supply chain risk management: Gilbert and Gips (2000) have mentioned that implementing supply chain-wide risk assessment may get more and more difficult as the number of links involved in the assessment gets higher. 20 more pages are available in the full version of this document, which may be purchased using the "Add to Cart" button on the product's webpage: www.igi-global.com/article/building-expert-system-maritimecontainer/52575?camid=4v1 This title is available in InfoSci-Journals, InfoSci-Journal Disciplines Business, Administration, and Management. Recommend this product to your librarian: www.igi-global.com/e-resources/libraryrecommendation/?id=2
منابع مشابه
An analysis of Role of Dry Ports on Development of Container Transit from the Iranian South Ports by Balanced Scorecard Method
In this paper, we are going to investigate the growth of the Iranian maritime transport with a focus mainly on the North - South transit Corridor, review of dry ports in order to support the Iranian container terminals at the south ports in order to increase the volume of container storages at the terminals. For the purpose of assessing the outcome of port operational management, the Balanced ...
متن کاملElectronic Container Tracking System as a Cost-Effective Tool in Intermodal and Maritime Transport Management
The amount of container goods that is lost due to theft, piracy, accidents and damage is unfortunately increasing. Real time remote containers tracking and monitoring can help prevent losing track of container and goods, as well as provide actionable information in order to retrieve goods or minimize damage. Moreover, the ability to determine responsibility in case of damage or theft leads to r...
متن کاملDeveloping a Security Event Management System for Intermodal Transport
Bremen, Federal State of Germany, is planning to set up a headquarter for GMES Global Monitoring of Environment and Security. One goal of the Institute of Shipping Economics and Logistics (ISL) is to develop services for GMES to improve the security in intermodal container transport with emphasis on the maritime sector. ISL is developing a Security Event Management System which takes care of al...
متن کاملA Fuzzy Expert System & Neuro-Fuzzy System Using Soft Computing For Gestational Diabetes Mellitus Diagnosis
Gestational diabetes mellitus (GDM) is a kind of diabetes that requires persistent medical care in patient self management education to prevent acute complications. One of the common and main problems in diagnosis of the diabetes is the weakness in its initial stages of the illness. This paper intends to propose an expert system in order to diagnose the risk of GDM by using FIS model. The knowl...
متن کاملA Fuzzy Expert System & Neuro-Fuzzy System Using Soft Computing For Gestational Diabetes Mellitus Diagnosis
Gestational diabetes mellitus (GDM) is a kind of diabetes that requires persistent medical care in patient self management education to prevent acute complications. One of the common and main problems in diagnosis of the diabetes is the weakness in its initial stages of the illness. This paper intends to propose an expert system in order to diagnose the risk of GDM by using FIS model. The knowl...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- IJAL
دوره 2 شماره
صفحات -
تاریخ انتشار 2011