Assessing Stakeholders’ Interests in Postal Security
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 32799
Assessing Stakeholders’ Interests in Postal Security

Authors: T. Männistö, M. Finger

Abstract:

The events of October 2010, where terrorists managed to get explosive devices onboard of three passenger aircrafts and two air freighters, demonstrated weaknesses of the international air cargo and airmail security. Ever since, postal security has gained interest among policymakers and authorities. This study augments the limited body of academic literature on the topic bydemarcating areas of postal security, identifying relevant stakeholders in each area, and investigating why these stakeholders engage in postal security. Research is based on a case study on Swiss Post’s mail service.

Keywords: Dangerous goods, mail bombs, postal security, supply chain security, theft of mail, trafficking.

Digital Object Identifier (DOI): doi.org/10.5281/zenodo.1086543

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1629

References:


[1] UPU, 2012. Postal Statistics – a summary, Economic and regulatory affairs directorate
[2] IPC, 2010. IPC cross-border e-commerce report
[3] Christin, N., 2012. Traveling the Silk Road: A measurement analysis of a large anonymous online marketplace (CMU-CyLab-12-018).
[4] Williams, Z., Lueg, J.E. &LeMay, S.A., 2008. Supply chain security: an overview and research agenda. The International Journal of Logistics Management, 19(2), pp.254–281.
[5] Männistö, T., Hintsa, J., Urciuoli, L., Supply Chain Crime – Taxonomy Development and Empirical Validation, International Journal of Shipping and Transport Logistics, forthcoming.
[6] Näslund, D., 2002. Logistics needs qualitative research–especially action research. International Journal of Physical Distribution & Logistics Management, 32(5), pp.321–338.
[7] Yin, R.K., 2009. Case Study Research, Sage Publications.
[8] Eisenhardt, K.M., 1989. Building theories from case study research. Academy of Management Review, pp.532–550.
[9] Miles, M.B. &Huberman, A.M., 1994. Qualitative Data Analysis: An Expanded Sourcebook 2nd ed., Sage Publications, Inc.
[10] Sheffi, Y., 2001. Supply chain management under the threat of international terrorism. The International Journal of Logistics Management, 12(2), pp.1–11.
[11] Closs, D.J. &McGarrell, E.F., 2004. Enhancing security throughout the supply chain.
[12] Urciuoli, L., 2009. Supply chain security—mitigation measures and a logistics multi-layered framework. Journal of Transportation Security, 3(1), pp.1-28.
[13] Rice, J.B. &Spayd, P.W., 2005a. Investing in Supply Chain Security : Collateral Benefits Special Report Series.
[14] Sternberg, H., Nyquist, C. & Nilsson, F., 2012. Enhancing Security Through Efficiency Focus—Insights From a Multiple Stakeholder Pilot Implementation. Journal of Business Logistics, 33(1), pp.64–73.
[15] Bakshi, N., Flynn, S.E. &Gans, N., 2011. Estimating the operational impact of container inspections at international ports. Management Science, 57(1), pp.1–20.
[16] Sheu, C., Lee, L. &Niehoff, B., 2006. A voluntary logistics security program and international supply chain partnership. Supply chain management: an international journal, 11(4), pp.363–374.
[17] Banomyong, R., 2005.The impact of port and trade security initiatives on maritime supply-chain management.Maritime Policy & Management, 32(1), pp.3–13.
[18] Bichou, K., 2004. The ISPS code and the cost of port compliance: An initial logistics and supply chain framework for port security assessment and management. Maritime Economics & Logistics, 6(4), pp.322–348.
[19] Gutierrez, X and Hintsa, J (2006), “Voluntary supply chain security programs: a systematic comparison” ILS 2006. The International Conference on Information Systems, Logistics and Supply Chain, Lyon, France, May 15-17
[20] Babbs, C. & O'Connor, B., 2003. Dealing with the threat of an attack through the post using biological agents: the UK experience. Journal of Contingencies and Crisis Management, 11(3), pp.118–123.
[21] Haelterman, H., Callens, M. &Beken, T.V., 2012. Controlling Access to Pick-up and Delivery Vans: The Cost of Alternative Measures. European Journal on Criminal Policy and Research, pp.1–20.
[22] McCarthy, K., R., C., 2019. Crime, Risk and Security the Identification and in Management of Risk-Distribution Pipeline of Royal Mail.Doctoral dissertation, the University of Porthsmouth.
[23] Hintsa et al. (2010a), “A holistic framework on voluntary SCS programs and standards – tool for analysis and design”, Journal of Transportation Security, Spring 2010 Issue.
[24] Williams, Z.,Lueg, J., E., Taylor R., D., 2009. Why all the changes?: An institutional theory approach to exploring the drivers of supply chain security (SCS). International Journal of Physical Distribution & Logistics Management, 39(7), pp.595–618.
[25] DiMaggio, P.J. and Powell, W.W. (1983), “The iron cage revisited: institutional isomorphism and collective rationality in organizational fields”, American Sociological Review, Vol. 48, pp. 147-60.
[26] Sarathy, R., 2006. Security and the global supply chain. Transportation journal, pp.28–51.
[27] Autry, C.W. & Bobbitt, L.M., 2008. Supply chain security orientation: conceptual development and a proposed framework. The International Journal of Logistics Management, 19(1), pp.42–64.
[28] David, P., Stewart, R., 2010International Logistics: Management of International Trade Operations
[29] General Civil Aviation Authority of the United Arab Emirates, 2010. Air Accident Investigation Interim Report, accident reference 13-2010.