Skip to main content
Top
Published in: Logistics Research 4/2013

01-12-2013 | Original Paper

The role of the law enforcement agencies in transport security, a survey with Swedish operators

Authors: Luca Urciuoli, Anthony Paulraj, Dag Näslund

Published in: Logistics Research | Issue 4/2013

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Transport security, that is, the protection against antagonistic attacks in form of terrorism, theft, counterfeiting, piracy etc. has become a major concern for managers during the last years. The consequences of security incidents include economic losses for industries, but in case of terror attacks may also affect society in general. If transport networks are not adequately protected, consumable products (e.g. food, pharmaceuticals) could be counterfeited or contaminated and smuggled into a country, giving rise to death or diseases. Today, to enhance the protection of transport networks, companies have wide access to handbooks, advanced security technologies or certification programs (e.g. TAPA EMEA, ISO28001, C-TPAT or AEO, etc.). Despite this, statistics indicate that transport networks are low-risk/high-revenue targets, and therefore security needs to be enhanced. The purpose of this paper is to highlight the role played by the law enforcement agencies in transport security. More specifically, this paper strives to demonstrate the influence of the allocation of law enforcement agencies’ resources on criminal justice efforts as well as on community policing activities to deter crime. Using Structural Equation Modelling techniques, two hypotheses are empirically tested on a sample of 577 Swedish transport operators. The results unveil that both the relationships are statistically significant. Finally, implications for managers and practitioners are discussed.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Appendix
Available only for authorised users
Footnotes
1
Insurance company seminar, Gothenburg, Sweden, March 2008. Workshop on Transportation Security, Jönköping, Sweden, November 2007.
 
Literature
1.
go back to reference Abbott G, Thomas R, Brandt L (2003) Commercium interrupts: supply chain responses to disaster, acquisition policy. Fort McNair, Washington, DC, pp 20319–25062 Abbott G, Thomas R, Brandt L (2003) Commercium interrupts: supply chain responses to disaster, acquisition policy. Fort McNair, Washington, DC, pp 20319–25062
2.
go back to reference Anderson B (2007) Securing the Supply Chain—Prevent Cargo Theft. Security 44(5):56–58 Anderson B (2007) Securing the Supply Chain—Prevent Cargo Theft. Security 44(5):56–58
3.
go back to reference Armstrong JS, Overton TS (1977) Estimating non-response bias in mail surveys. J Mark Res 14(3):396–402CrossRef Armstrong JS, Overton TS (1977) Estimating non-response bias in mail surveys. J Mark Res 14(3):396–402CrossRef
4.
go back to reference Badolato EV (2000) Smart moves against cargo theft. Secur Manag 44:110–115 Badolato EV (2000) Smart moves against cargo theft. Secur Manag 44:110–115
5.
go back to reference Becker GS (1968) Crime and punishment: an economic approach. J Polit Econ 78:169–217CrossRef Becker GS (1968) Crime and punishment: an economic approach. J Polit Econ 78:169–217CrossRef
6.
go back to reference Benson BL, Rasmussen DW, Kim I (1998) Deterrence and public policy: trade-offs in the allocation of police resources. Int Rev Law Econ 18:77–100CrossRef Benson BL, Rasmussen DW, Kim I (1998) Deterrence and public policy: trade-offs in the allocation of police resources. Int Rev Law Econ 18:77–100CrossRef
7.
go back to reference Bright C, Walker J (1993) Police Resource Allocation. In: Biles D, McKillop S (eds) Proceedings of a conference held 19–21 April 1993, Australian Institute of Criminology, Canberra. ISBN 0 642 20269 9 ISSN 1034-5086, January 1994 Bright C, Walker J (1993) Police Resource Allocation. In: Biles D, McKillop S (eds) Proceedings of a conference held 19–21 April 1993, Australian Institute of Criminology, Canberra. ISBN 0 642 20269 9 ISSN 1034-5086, January 1994
8.
go back to reference Cameron S (1988) The economics of crime deterrence: a survey of theory and evidence. Kyklos 41:301–323CrossRef Cameron S (1988) The economics of crime deterrence: a survey of theory and evidence. Kyklos 41:301–323CrossRef
10.
go back to reference Cochran WG (1977) Sampling techniques. Wiley, New York, NY Cochran WG (1977) Sampling techniques. Wiley, New York, NY
11.
go back to reference Cornwell C, Trumbull WN (1994) Estimating the economic model of crime with panel data. Rev Econ Stat 76:360–366CrossRef Cornwell C, Trumbull WN (1994) Estimating the economic model of crime with panel data. Rev Econ Stat 76:360–366CrossRef
12.
go back to reference Craighead CW, Blackhurst J, Rungtusanatham MJ, Handfield RB (2007) The severity of supply chain disruptions: design characteristics and mitigation capabilities. Decis Sci 38(1):131–156CrossRef Craighead CW, Blackhurst J, Rungtusanatham MJ, Handfield RB (2007) The severity of supply chain disruptions: design characteristics and mitigation capabilities. Decis Sci 38(1):131–156CrossRef
13.
go back to reference Crone M (2006) Are global supply chain too risky? A practitioner’s perspective. Supply Chain Manag Rev 10(4):25–32 Crone M (2006) Are global supply chain too risky? A practitioner’s perspective. Supply Chain Manag Rev 10(4):25–32
14.
go back to reference Cupp OS, Walker DE, Hillison J (2004) Agro terrorism in the US: key security challenge for the 21st century. Biosecur Terror 2(2):97–105 Cupp OS, Walker DE, Hillison J (2004) Agro terrorism in the US: key security challenge for the 21st century. Biosecur Terror 2(2):97–105
15.
go back to reference Czaja R, Blair J (2005) Designing surveys: a guide to decisions and procedures. Sage Publications, London Czaja R, Blair J (2005) Designing surveys: a guide to decisions and procedures. Sage Publications, London
16.
go back to reference Dunn SC, Seaker RF, Waller MA (1994) Latent variables in business logistics research: scale development and validation. J Bus Logist 15(2):145–172 Dunn SC, Seaker RF, Waller MA (1994) Latent variables in business logistics research: scale development and validation. J Bus Logist 15(2):145–172
17.
go back to reference Easterby-Smith M, Thorpe R, Lowe A (1991) Management research: an introduction. Sage Publications, London Easterby-Smith M, Thorpe R, Lowe A (1991) Management research: an introduction. Sage Publications, London
18.
go back to reference Ekwall D (2007) Antagonistic gateways in the transport network in a supply chain perspective. Licentiate Dissertation, Chalmers University, Gothenburg Ekwall D (2007) Antagonistic gateways in the transport network in a supply chain perspective. Licentiate Dissertation, Chalmers University, Gothenburg
19.
go back to reference Ekwall D (2009) The displacement effect in cargo theft. Int J Phys Distrib Logist Manag 1(39):47–62 Ekwall D (2009) The displacement effect in cargo theft. Int J Phys Distrib Logist Manag 1(39):47–62
20.
go back to reference EU (2003) Freight Transport Security. Consultation paper. European Commission, Brussels EU (2003) Freight Transport Security. Consultation paper. European Commission, Brussels
21.
go back to reference European Parliament (2007) Organised theft of commercial vehicles and their loads in the European Union—Rep. No. 610. ACEA, Directorate General for Internal Policies of the Union, Brussels European Parliament (2007) Organised theft of commercial vehicles and their loads in the European Union—Rep. No. 610. ACEA, Directorate General for Internal Policies of the Union, Brussels
22.
go back to reference Giunipero LC, Eltantawy RA (2004) Securing the upstream supply chain: a risk management approach. Int J Phys Distrib Logist Manag 34(9):698–713CrossRef Giunipero LC, Eltantawy RA (2004) Securing the upstream supply chain: a risk management approach. Int J Phys Distrib Logist Manag 34(9):698–713CrossRef
23.
go back to reference Glaser BG, Strauss A (1967) The discovery of grounded theory: strategies for qualitative research. Aldine, Chicago Glaser BG, Strauss A (1967) The discovery of grounded theory: strategies for qualitative research. Aldine, Chicago
24.
go back to reference Hair JF, Black B, Barry B, Anderson RE, Tatham RL (2009) Multivariate data analysis. Pearson Prentice Hall, Upper Saddle River, NY Hair JF, Black B, Barry B, Anderson RE, Tatham RL (2009) Multivariate data analysis. Pearson Prentice Hall, Upper Saddle River, NY
25.
go back to reference Hess KM, Wrobleski HM (1996) Introduction to private security. West Publishing Company, Saint Paul, MN Hess KM, Wrobleski HM (1996) Introduction to private security. West Publishing Company, Saint Paul, MN
26.
go back to reference Hintsa J (2011) Post-2001 Supply Chain Security—impacts on the private sector. HEC Lausanne, Lausanne Hintsa J (2011) Post-2001 Supply Chain Security—impacts on the private sector. HEC Lausanne, Lausanne
27.
go back to reference Iarossi G (2006) The power of survey design: a users’ guide for managing surveys, interpreting results, and influencing respondents. The World Bank, WashingtonCrossRef Iarossi G (2006) The power of survey design: a users’ guide for managing surveys, interpreting results, and influencing respondents. The World Bank, WashingtonCrossRef
29.
go back to reference Joreskog KG, Sorbom D (1999) LISREL 8: user’s reference guide. Scientific Software, Chicago, IL Joreskog KG, Sorbom D (1999) LISREL 8: user’s reference guide. Scientific Software, Chicago, IL
30.
go back to reference Milakovich Michael, Weis K (1975) Politics and Measures of Success in the War on Crime. Crime Delinq 21:1–10CrossRef Milakovich Michael, Weis K (1975) Politics and Measures of Success in the War on Crime. Crime Delinq 21:1–10CrossRef
31.
go back to reference Moore MH, Trojanowicz RC, Kelling GL (1988) Crime and policing, Perspectives on Policing, No. 2, June 1988 Moore MH, Trojanowicz RC, Kelling GL (1988) Crime and policing, Perspectives on Policing, No. 2, June 1988
32.
go back to reference Naylor RT (2002) Wages of crime: black markets, illegal finance and the underworld economy. Cornell University, NY Naylor RT (2002) Wages of crime: black markets, illegal finance and the underworld economy. Cornell University, NY
33.
go back to reference Näslund D (2002) Logistics needs qualitative research: especially action research. Int J Phys Distrib Logist Manag 32(5):321–338CrossRef Näslund D (2002) Logistics needs qualitative research: especially action research. Int J Phys Distrib Logist Manag 32(5):321–338CrossRef
35.
go back to reference Paulraj A, Lado AA, Chen IJ (2008) Inter-organizational communication as a relational competency: antecedents and performance outcomes in collaborative buyer–supplier relationships. J Oper Manag 26(1):45–64CrossRef Paulraj A, Lado AA, Chen IJ (2008) Inter-organizational communication as a relational competency: antecedents and performance outcomes in collaborative buyer–supplier relationships. J Oper Manag 26(1):45–64CrossRef
36.
go back to reference Peleg-Gillai B, Bhat G, Sept L (2006) Innovators in supply chain security: better security drives business value. The Manufacturing Innovation Series: Stanford University—The Manufacturing Institute Peleg-Gillai B, Bhat G, Sept L (2006) Innovators in supply chain security: better security drives business value. The Manufacturing Innovation Series: Stanford University—The Manufacturing Institute
37.
go back to reference Piquero AR, Hickman M (2002) The rational choice implications of control balance theory. In: Piquero AR, Tibbetts SG (eds) Rational choice and criminal behavior. Routledge, New York Piquero AR, Hickman M (2002) The rational choice implications of control balance theory. In: Piquero AR, Tibbetts SG (eds) Rational choice and criminal behavior. Routledge, New York
39.
go back to reference Sheffi Y (2001) Supply chain management under the threat of international terrorism. Int J Logist Manag 12(2):1–11MathSciNetCrossRef Sheffi Y (2001) Supply chain management under the threat of international terrorism. Int J Logist Manag 12(2):1–11MathSciNetCrossRef
40.
go back to reference Sherman LW (1983) Patrol strategies for police. In: Wilson JQ (ed) Crime and public policy. Institute for Contemporary Studies, San Francisco, pp 145–163 Sherman LW (1983) Patrol strategies for police. In: Wilson JQ (ed) Crime and public policy. Institute for Contemporary Studies, San Francisco, pp 145–163
41.
go back to reference Thomas D (2006) Summary and analysis of eye for transport’s survey: cargo and supply chain security trends. Cargo and Supply Chain Security Report. 5th North American Cargo Security Forum Thomas D (2006) Summary and analysis of eye for transport’s survey: cargo and supply chain security trends. Cargo and Supply Chain Security Report. 5th North American Cargo Security Forum
42.
go back to reference Tomlin B (2006) On the value of mitigation and contingency strategies for managing supply chain disruption risks. Manag Sci 52(5):639–657MathSciNetCrossRef Tomlin B (2006) On the value of mitigation and contingency strategies for managing supply chain disruption risks. Manag Sci 52(5):639–657MathSciNetCrossRef
43.
go back to reference Trojanowicz R, Moore MH (1988) The meaning of community in community policing. National Neighborhood Foot Patrol Center, East Lansing, MI Trojanowicz R, Moore MH (1988) The meaning of community in community policing. National Neighborhood Foot Patrol Center, East Lansing, MI
45.
go back to reference Urciuoli L (2010) Supply chain security—mitigation measures and logistics multi-layered framework. J Transp Secur 1(3):1–28CrossRef Urciuoli L (2010) Supply chain security—mitigation measures and logistics multi-layered framework. J Transp Secur 1(3):1–28CrossRef
46.
go back to reference Urciuoli L (2013) The physical distribution security system: how stakeholders affect security. J Transp Manag (accepted) Urciuoli L (2013) The physical distribution security system: how stakeholders affect security. J Transp Manag (accepted)
47.
go back to reference Viswanadham N, Gaonkar RS (2008) Risk management in global supply chain networks. In: Tang CS, Teo C-P, We K-K (eds) Supply chain analysis: a handbook on the interaction of information, system and optimization, International series in operations research and management science, vol 119, pp 201–222 Viswanadham N, Gaonkar RS (2008) Risk management in global supply chain networks. In: Tang CS, Teo C-P, We K-K (eds) Supply chain analysis: a handbook on the interaction of information, system and optimization, International series in operations research and management science, vol 119, pp 201–222
48.
go back to reference Voss MD, Closs DJ, Calantone RJ, Helferich OK (2009) The role of security in the food supplier selection decision. J Bus Logist 30(1):127–155CrossRef Voss MD, Closs DJ, Calantone RJ, Helferich OK (2009) The role of security in the food supplier selection decision. J Bus Logist 30(1):127–155CrossRef
49.
go back to reference Walker J (1993) Crime in Australia: As Measured by the Australian Component of the International Crime Victims Survey 1992. Australian Institute of Criminology, Canberra Walker J (1993) Crime in Australia: As Measured by the Australian Component of the International Crime Victims Survey 1992. Australian Institute of Criminology, Canberra
50.
go back to reference Whipple JM, Voss MD, Closs DJ (2009) Supply chain security practices in the food industries: do firms operating globally and domestically differ? Int J Phys Distrib Logist Manag 39(7):574–594CrossRef Whipple JM, Voss MD, Closs DJ (2009) Supply chain security practices in the food industries: do firms operating globally and domestically differ? Int J Phys Distrib Logist Manag 39(7):574–594CrossRef
51.
go back to reference Williams Z, Lueg JE, LeMay SA (2008) Supply chain security: an overview and research agenda. Int J Logist Manag 19(2):254–281CrossRef Williams Z, Lueg JE, LeMay SA (2008) Supply chain security: an overview and research agenda. Int J Logist Manag 19(2):254–281CrossRef
52.
go back to reference Willys HH, Ortiz DS (2004) Evaluating the security of the global containerized supply chain. RAND Corporation, Santa Monica, CA Willys HH, Ortiz DS (2004) Evaluating the security of the global containerized supply chain. RAND Corporation, Santa Monica, CA
Metadata
Title
The role of the law enforcement agencies in transport security, a survey with Swedish operators
Authors
Luca Urciuoli
Anthony Paulraj
Dag Näslund
Publication date
01-12-2013
Publisher
Springer Berlin Heidelberg
Published in
Logistics Research / Issue 4/2013
Print ISSN: 1865-035X
Electronic ISSN: 1865-0368
DOI
https://doi.org/10.1007/s12159-013-0102-8

Other articles of this Issue 4/2013

Logistics Research 4/2013 Go to the issue