Self assessment of security risk

Solo disponible en BuenasTareas
  • Páginas : 10 (2420 palabras )
  • Descarga(s) : 0
  • Publicado : 7 de noviembre de 2011
Leer documento completo
Vista previa del texto
SELF ASSESSMENT OF SECURITY RISK

Deniz Angélica Ramos López and Pedro Pérez Villanueva

Corresponding author’s e-mail: dramos@comimsa.com

Abstract: Based on the supply chain management practices and in the literature review process, it was found that ensuring security along the supply chain is fundamental to trade with other countries. Knowing the areas of opportunity for security allowsbetter focus on the efforts to achieve a secure supply chain. Using the Analytic Hierarchy Process to ponder qualitative criteria, the minimum security standards and the best practices it is possible to carry out a self- evaluation of security risk. In this work, it is introduced a practical tool called Self-assessment of Supply Chain Risk. Self-evaluation improves the management of the supplychain, considering the level of security risk. It is based on the perception of safety within the supply chain managers. The need to measure the level of perceived safety in a supply chain makes this measurement tool, an excellent guide that shows areas of opportunity for security.

1. INtroduction

Currently, the public sector is very concerned about the possibility of having weapons of massivedestruction among the shipments through the supply chain, inasmuch as they can generate a significant loss of human lives, destruction of infrastructure and the reduced trust of public and business as well. The increase in the risk with regarding to security threats on supply chains are reshaping the way to design, organize and manage logistics systems (Pfohl et al., 2010).
On this viewpoint,there are different limits to prevent that a company fulfilling adequately its mission. So, one of them is to keep the total cost of the supply chain competitive in order to guaranteeing its total security. Assessing the risk of further terrorist attacks or transporting weapons of mass destruction has been a global priority (Lee and Whang, 2005) and the security in supply chain is fundamental totrade with other countries.
Exporting companies must know the level of risk associated with their departments and activities, so they need evaluate themselves. Thereby, it is to establish the weaknesses of the company and resolve them in a set time. Additionally knowing opportunity areas makes supply chains possible to strengthen vulnerable zones. The main objective at reducing the securitybreaches is to mitigate the loss of prestige and/or trust that may be due to the contamination or loss of products, causing delays in delivery.

2. ANTECEDENTS

Globalization has facilitated trade; however, as a result, the supply chains are each day more vulnerable (Donner and Kruk, 2009). Right after 9/11, security became a major requirement to be able to export to the most important markets.Therefore increasingly a need for greater visibility into risks across the entire supply chain.
Taking in account that security measures are avoid interruptions in supply chain, many companies are working hard with security tools such as: 1) to prevent theft, 2) to comply with work rules and 3) other regulations for personal protection.
To achieve these facts, it is necessary to control eachprocess, preventing it from soiling the image of the product or the company, eradicating illicit activities and those that do not create value and are not necessary. It is vital to know the weak links in supply chain and take the necessary control measures.

Basic Concepts

Some basic concepts for the development of this tool are:

Supply Chain

A supply chain is a network of facilities anddistribution channels that encompasses the procurement of materials, production, assembly and delivery of products or services to the customer (Borade and Bansod, 2007). A supply chain includes all companies and business from the supplier’s supplier to the customer’s customer. The management of the supply chain and the roles of various actors involved, differ from industry to industry and company to...
tracking img