SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Riahi R, Li K, Robertson I, Jenkinson I, Bonsall S, Wang J. Proc. Inst. Mech. Eng. Pt. M J. Eng. Marit. Environ. 2014; 228(1): 81-104.

Copyright

(Copyright © 2014, Professional Engineering Publishing)

DOI

10.1177/1475090213491890

PMID

unavailable

Abstract

A container supply chain includes a large number of stakeholders who can physically come into contact with containers and their contents and are potentially related with the container trade and transportation. Security-based disruptions can occur at various points along the supply chain. Experience has shown that a limited percentage of inspection, coupled with a targeted approach based on risk analysis, can provide an acceptable security level. Thus, in order to not hamper the logistics process in an intolerable manner, the number of physical checks should be chosen cautiously. The aim of this article is to employ a set of data elements (i.e. an importer security filling, shipping documents, the value of an ocean or a sea carrier's reliability, the security scores of various commercial operators and their premises) to exploit a mathematical decision-making model for evaluating a container's security score. For evaluating a container's security score, a combination of different decision-making techniques such as Bayesian network and analytic hierarchy process is used. The methodology developed has been applied to a case study in order to demonstrate the process involved. Accordingly, the control options to avoid unnecessary delays and security scanning in dealing with containers are suggested.


Language: en

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print