IDEAS home Printed from https://ideas.repec.org/a/eee/ejores/v271y2018i1p331-340.html
   My bibliography  Save this article

The role of customs in securing containerized global supply chains

Author

Listed:
  • Pourakbar, M.
  • Zuidwijk, R.A.

Abstract

Customs has to deal with a massive number of containers arriving at ports. This massive flow of cargo provides an opportunity for organized crime infiltration. Risk management and the security of the supply chain has become a top priority for Customs administrations and for private firms. In this paper, we develop models that allow Customs to optimize its inspection process to target high-risk containers without hindering the flow of safe containers with extra delays at ports. The model characterizes optimal informational and physical inspection rates as a function of the risk factors attributed to containers. We use this model to analyze how an effective public–private partnership for risk and security management can be established between Customs and private firms.

Suggested Citation

  • Pourakbar, M. & Zuidwijk, R.A., 2018. "The role of customs in securing containerized global supply chains," European Journal of Operational Research, Elsevier, vol. 271(1), pages 331-340.
  • Handle: RePEc:eee:ejores:v:271:y:2018:i:1:p:331-340
    DOI: 10.1016/j.ejor.2018.05.012
    as

    Download full text from publisher

    File URL: http://www.sciencedirect.com/science/article/pii/S0377221718304065
    Download Restriction: Full text for ScienceDirect subscribers only

    File URL: https://libkey.io/10.1016/j.ejor.2018.05.012?utm_source=ideas
    LibKey link: if access is restricted and if your library uses this service, LibKey will redirect you to where you can use your library subscription to access this item
    ---><---

    As the access to this document is restricted, you may want to search for a different version of it.

    References listed on IDEAS

    as
    1. Mohammad E. Nikoofal & Jun Zhuang, 2012. "Robust Allocation of a Defensive Budget Considering an Attacker's Private Information," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 930-943, May.
    2. Vicki M. Bier, 2007. "Choosing What to Protect," Risk Analysis, John Wiley & Sons, vol. 27(3), pages 607-620, June.
    3. Nie, Xiaofeng & Batta, Rajan & Drury, Colin G. & Lin, Li, 2009. "Passenger grouping with risk levels in an airport security system," European Journal of Operational Research, Elsevier, vol. 194(2), pages 574-584, April.
    4. Laura A. McLay & Adrian J. Lee & Sheldon H. Jacobson, 2010. "Risk-Based Policies for Airport Security Checkpoint Screening," Transportation Science, INFORMS, vol. 44(3), pages 333-349, August.
    5. Nitin Bakshi & Stephen E. Flynn & Noah Gans, 2011. "Estimating the Operational Impact of Container Inspections at International Ports," Management Science, INFORMS, vol. 57(1), pages 1-20, January.
    6. Lazar Babu, Vellara L. & Batta, Rajan & Lin, Li, 2006. "Passenger grouping under constant threat probability in an airport security system," European Journal of Operational Research, Elsevier, vol. 168(2), pages 633-644, January.
    7. Jun Zhuang & Vicki M. Bier, 2007. "Balancing Terrorism and Natural Disasters---Defensive Strategy with Endogenous Attacker Effort," Operations Research, INFORMS, vol. 55(5), pages 976-991, October.
    8. Naraphorn Haphuriwat & Vicki M. Bier & Henry H. Willis, 2011. "Deterring the Smuggling of Nuclear Weapons in Container Freight Through Detection and Retaliation," Decision Analysis, INFORMS, vol. 8(2), pages 88-102, June.
    9. Paul Kantor & Endre Boros, 2010. "Deceptive Detection Methods for Effective Security with Inadequate Budgets: The Testing Power Index," Risk Analysis, John Wiley & Sons, vol. 30(4), pages 663-673, April.
    10. Jesus Rios & David Rios Insua, 2012. "Adversarial Risk Analysis for Counterterrorism Modeling," Risk Analysis, John Wiley & Sons, vol. 32(5), pages 894-915, May.
    11. Niyazi Bakır, 2011. "A Stackelberg game model for resource allocation in cargo container security," Annals of Operations Research, Springer, vol. 187(1), pages 5-22, July.
    12. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    13. Lawrence M. Wein & Alex H. Wilkins & Manas Baveja & Stephen E. Flynn, 2006. "Preventing the Importation of Illicit Nuclear Materials in Shipping Containers," Risk Analysis, John Wiley & Sons, vol. 26(5), pages 1377-1393, October.
    14. Nitin Bakshi & Noah Gans, 2010. "Securing the Containerized Supply Chain: Analysis of Government Incentives for Private Investment," Management Science, INFORMS, vol. 56(2), pages 219-233, February.
    15. Nie, Xiaofeng & Parab, Gautam & Batta, Rajan & Lin, Li, 2012. "Simulation-based Selectee Lane queueing design for passenger checkpoint screening," European Journal of Operational Research, Elsevier, vol. 219(1), pages 146-155.
    16. Edieal J. Pinker, 2007. "An Analysis of Short-Term Responses to Threats of Terrorism," Management Science, INFORMS, vol. 53(6), pages 865-880, June.
    17. Lee, Hau L. & Whang, Seungjin, 2005. "Higher supply chain security with lower cost: Lessons from total quality management," International Journal of Production Economics, Elsevier, vol. 96(3), pages 289-300, June.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Guo Li & Na Li, 2019. "Customs classification for cross-border e-commerce based on text-image adaptive convolutional neural network," Electronic Commerce Research, Springer, vol. 19(4), pages 779-800, December.
    2. Wang, H. & Pan, Chen & Wang, Qunwei & Zhou, P., 2020. "Assessing sustainability performance of global supply chains: An input-output modeling approach," European Journal of Operational Research, Elsevier, vol. 285(1), pages 393-404.
    3. Richard R. Young & Gary A. Gordon, 2020. "Intermodal maritime supply chains: assessing factors for resiliency and security," Journal of Transportation Security, Springer, vol. 13(3), pages 231-244, December.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Mohammad Ebrahim Nikoofal & Morteza Pourakbar & Mehmet Gumus, 2023. "Securing containerized supply chain through public and private partnership," Production and Operations Management, Production and Operations Management Society, vol. 32(7), pages 2341-2361, July.
    2. Yan, Xihong & Ren, Xiaorong & Nie, Xiaofeng, 2022. "A budget allocation model for domestic airport network protection," Socio-Economic Planning Sciences, Elsevier, vol. 82(PB).
    3. Aniruddha Bagchi & Jomon Aliyas Paul, 2014. "Optimal Allocation of Resources in Airport Security: Profiling vs. Screening," Operations Research, INFORMS, vol. 62(2), pages 219-233, April.
    4. Hunt, Kyle & Agarwal, Puneet & Zhuang, Jun, 2022. "On the adoption of new technology to enhance counterterrorism measures: An attacker–defender game with risk preferences," Reliability Engineering and System Safety, Elsevier, vol. 218(PB).
    5. Wang, Xiaofang & Zhuang, Jun, 2011. "Balancing congestion and security in the presence of strategic applicants with private information," European Journal of Operational Research, Elsevier, vol. 212(1), pages 100-111, July.
    6. Bagchi, Aniruddha & Paul, Jomon A., 2017. "Espionage and the optimal standard of the Customs-Trade Partnership against Terrorism (C-TPAT) program in maritime security," European Journal of Operational Research, Elsevier, vol. 262(1), pages 89-107.
    7. Xiaojun (Gene) Shan & Jun Zhuang, 2014. "Modeling Credible Retaliation Threats in Deterring the Smuggling of Nuclear Weapons Using Partial Inspection---A Three-Stage Game," Decision Analysis, INFORMS, vol. 11(1), pages 43-62, March.
    8. Sushil Gupta & Martin K. Starr & Reza Zanjirani Farahani & Mahsa Mahboob Ghodsi, 2020. "Prevention of Terrorism–An Assessment of Prior POM Work and Future Potentials," Production and Operations Management, Production and Operations Management Society, vol. 29(7), pages 1789-1815, July.
    9. Cen Song & Jun Zhuang, 2017. "Two-stage security screening strategies in the face of strategic applicants, congestions and screening errors," Annals of Operations Research, Springer, vol. 258(2), pages 237-262, November.
    10. David Anderson, 2021. "Optimising multi-layered security screening," Journal of Transportation Security, Springer, vol. 14(3), pages 249-273, December.
    11. Andres F. Jola-Sanchez & Juan Camilo Serpa, 2021. "Inventory in Times of War," Management Science, INFORMS, vol. 67(10), pages 6457-6479, October.
    12. Song, Cen & Zhuang, Jun, 2017. "N-stage security screening strategies in the face of strategic applicants," Reliability Engineering and System Safety, Elsevier, vol. 165(C), pages 292-301.
    13. Bakker, Craig & Webster, Jennifer B. & Nowak, Kathleen E. & Chatterjee, Samrat & Perkins, Casey J. & Brigantic, Robert, 2020. "Multi-Game Modeling for Counter-Smuggling," Reliability Engineering and System Safety, Elsevier, vol. 200(C).
    14. Martina de Gramatica & Fabio Massacci & Woohyun Shim & Uğur Turhan & Julian Williams, 2017. "Agency Problems and Airport Security: Quantitative and Qualitative Evidence on the Impact of Security Training," Risk Analysis, John Wiley & Sons, vol. 37(2), pages 372-395, February.
    15. Yan, Xihong & Nie, Xiaofeng, 2016. "Optimal placement of multiple types of detectors under a small vessel attack threat to port security," Transportation Research Part E: Logistics and Transportation Review, Elsevier, vol. 93(C), pages 71-94.
    16. Xiaojun Shan & Jun Zhuang, 2013. "Cost of Equity in Homeland Security Resource Allocation in the Face of a Strategic Attacker," Risk Analysis, John Wiley & Sons, vol. 33(6), pages 1083-1099, June.
    17. Xing Gao & Weijun Zhong & Shue Mei, 2013. "Information Security Investment When Hackers Disseminate Knowledge," Decision Analysis, INFORMS, vol. 10(4), pages 352-368, December.
    18. Nie, Xiaofeng, 2019. "The impact of conditional dependence on checked baggage screening," European Journal of Operational Research, Elsevier, vol. 278(3), pages 883-893.
    19. Abdolmajid Yolmeh & Melike Baykal-Gürsoy, 2019. "Two-Stage Invest–Defend Game: Balancing Strategic and Operational Decisions," Decision Analysis, INFORMS, vol. 16(1), pages 46-66, March.
    20. Insua, Insua Rios & Rios, Jesus & Banks, David, 2009. "Adversarial Risk Analysis," Journal of the American Statistical Association, American Statistical Association, vol. 104(486), pages 841-854.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:eee:ejores:v:271:y:2018:i:1:p:331-340. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Catherine Liu (email available below). General contact details of provider: http://www.elsevier.com/locate/eor .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.