12.07.2015 Views

Investing in Supply Chain Security: Collateral Benefits - supports the ...

Investing in Supply Chain Security: Collateral Benefits - supports the ...

Investing in Supply Chain Security: Collateral Benefits - supports the ...

SHOW MORE
SHOW LESS
  • No tags were found...

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

M A Y 2 0 0 5<strong>Invest<strong>in</strong>g</strong> <strong>in</strong> <strong>Supply</strong> Cha<strong>in</strong> <strong>Security</strong>:<strong>Collateral</strong> <strong>Benefits</strong>Special Report SeriesJames B. Rice, Jr.Director, Integrated <strong>Supply</strong> Cha<strong>in</strong>Management ProgramCenter for Transportation and LogisticsMassachusetts Institute of TechnologyPhilip W. SpaydResearch AffiliateCenter for Transportation and LogisticsMassachusetts Institute of Technology


SPECIAL REPORT SERIES<strong>Invest<strong>in</strong>g</strong> <strong>in</strong> <strong>Supply</strong> Cha<strong>in</strong> <strong>Security</strong>:<strong>Collateral</strong> <strong>Benefits</strong>James B. Rice, Jr.Director, Integrated <strong>Supply</strong> Cha<strong>in</strong>Management ProgramCenter for Transportation and LogisticsMassachusetts Institute of TechnologyPhilip W. SpaydResearch AffiliateCenter for Transportation and LogisticsMassachusetts Institute of TechnologyMay 2005


T A B L E O F C O N T E N T SForeword .............................................................................................3Executive Summary ..............................................................................4Introduction .........................................................................................6About <strong>the</strong> Report ...........................................................................6Global <strong>Supply</strong> Cha<strong>in</strong> Vulnerability and <strong>Security</strong> ...........................6Mak<strong>in</strong>g <strong>the</strong> Case for <strong>Supply</strong> Cha<strong>in</strong> <strong>Security</strong> Investments ...............7<strong>Collateral</strong> <strong>Benefits</strong>: A Promis<strong>in</strong>g Approach to ROI ...............................8The Major <strong>Collateral</strong> Benefit: Facilitat<strong>in</strong>g Trade ..............................8Options to Create Additional <strong>Collateral</strong> <strong>Benefits</strong> ............................9<strong>Collateral</strong> <strong>Benefits</strong> from Asset Visibility and Track<strong>in</strong>g .....................9<strong>Collateral</strong> <strong>Benefits</strong> from Personnel <strong>Security</strong> ..................................10<strong>Collateral</strong> <strong>Benefits</strong> from Physical <strong>Security</strong> ....................................10<strong>Collateral</strong> <strong>Benefits</strong> from Standards Development .........................10<strong>Collateral</strong> <strong>Benefits</strong> from Supplier Selection and Investment .........12<strong>Collateral</strong> <strong>Benefits</strong> from Transportation andConveyance <strong>Security</strong> .............................................................12<strong>Collateral</strong> <strong>Benefits</strong> from Build<strong>in</strong>g Organizational InfrastructureAwareness and Capabilities ...................................................12<strong>Collateral</strong> <strong>Benefits</strong> from Collaboration Among <strong>Supply</strong>Cha<strong>in</strong> Parties .........................................................................13<strong>Collateral</strong> <strong>Benefits</strong> from Proactive Technology Investments ..........14<strong>Collateral</strong> <strong>Benefits</strong> from TQM Investments ...................................14<strong>Collateral</strong> <strong>Benefits</strong> from Voluntary <strong>Security</strong> Compliance ..............15Achiev<strong>in</strong>g <strong>Collateral</strong> <strong>Benefits</strong> .............................................................18Connect<strong>in</strong>g <strong>Security</strong> Investments and <strong>Collateral</strong> <strong>Benefits</strong> .............18Mak<strong>in</strong>g <strong>the</strong> Connection: <strong>Collateral</strong> <strong>Benefits</strong> L<strong>in</strong>kage Maps ..........18Challenges and Choices for Creat<strong>in</strong>g <strong>Collateral</strong> <strong>Benefits</strong> ..............19Conclusion .........................................................................................21Observations and Issues to Consider ...........................................21The Challenge and Opportunity ..................................................21Look<strong>in</strong>g Ahead ............................................................................22Appendix: Overview of <strong>Supply</strong> Cha<strong>in</strong> <strong>Security</strong> Investment Options ....24Endnotes ............................................................................................26About <strong>the</strong> Authors ..............................................................................28Key Contact Information ....................................................................302


INVESTING IN SUPPLY CHAIN SECURITYF O R E W O R DMay 2005On behalf of <strong>the</strong> IBM Center for The Bus<strong>in</strong>ess of Government, we are pleased to present this report, “<strong>Invest<strong>in</strong>g</strong><strong>in</strong> <strong>Supply</strong> Cha<strong>in</strong> <strong>Security</strong>: <strong>Collateral</strong> <strong>Benefits</strong>,” by James B. Rice, Jr., and Philip W. Spayd. This report is believedto be <strong>the</strong> first to exam<strong>in</strong>e whe<strong>the</strong>r <strong>the</strong> benefits ga<strong>in</strong>ed from <strong>in</strong>vest<strong>in</strong>g <strong>in</strong> security exceed <strong>the</strong> costs. It also looksat <strong>the</strong> important question of whe<strong>the</strong>r greater collaboration between government and <strong>the</strong> private sector leads toimproved supply cha<strong>in</strong> security, reduces overall cost, and improves efficiencies.This is <strong>the</strong> second comprehensive report that IBM has sponsored to <strong>in</strong>vestigate supply cha<strong>in</strong> security. In 2004,<strong>the</strong> IBM Center for The Bus<strong>in</strong>ess of Government partnered with Michigan State University to publish “Enhanc<strong>in</strong>g<strong>Security</strong> Throughout <strong>the</strong> <strong>Supply</strong> Cha<strong>in</strong>,” aimed at help<strong>in</strong>g bus<strong>in</strong>esses better understand <strong>the</strong> threat to supply cha<strong>in</strong>sfrom disruptions. This new report asserts that while <strong>the</strong> United States and o<strong>the</strong>r governments have taken stepsto secure <strong>in</strong>ternational transportation systems, supply cha<strong>in</strong>s rema<strong>in</strong> vulnerable to terrorist attack and exposedto <strong>the</strong> <strong>in</strong>troduction of unauthorized people or weapons. It also responds to <strong>in</strong>dustry concern that governmentaction to impose tougher standards and processes erodes trade efficiency by add<strong>in</strong>g cost and complexity.Rice and Spayd say <strong>the</strong>y approached this report with <strong>the</strong> objective of encourag<strong>in</strong>g bus<strong>in</strong>ess executives, researchers,and government officials to ask questions, conduct research, and make decisions about how to approach<strong>in</strong>vest<strong>in</strong>g <strong>in</strong> supply cha<strong>in</strong> security to best determ<strong>in</strong>e <strong>the</strong> collateral benefits. They say it is difficult to quantify howa specific security action prevented a problem from occurr<strong>in</strong>g <strong>in</strong> <strong>the</strong> supply cha<strong>in</strong> or <strong>the</strong> cost that was avoided.If someth<strong>in</strong>g is stolen or <strong>the</strong>re is a noticeable reduction <strong>in</strong> <strong>the</strong>ft, <strong>the</strong>n it can be measured. But calculat<strong>in</strong>g <strong>the</strong>cost of a security breach or disruption that did not occur is virtually impossible.In this report, Rice and Spayd help bus<strong>in</strong>ess leaders and security managers quantify <strong>the</strong> bus<strong>in</strong>ess case for <strong>in</strong>creas<strong>in</strong>g<strong>in</strong>vestment <strong>in</strong> security. The report discusses <strong>in</strong>vestments <strong>in</strong> supply cha<strong>in</strong> security that have shown promise tocreate collateral benefits, as well as emerg<strong>in</strong>g benefits that need to be considered. The authors believe that perhaps<strong>the</strong> most significant collateral benefit is a firm’s ability to cont<strong>in</strong>ue operations <strong>in</strong> <strong>the</strong> event of a disruption toits supply cha<strong>in</strong>, ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g supply cha<strong>in</strong> cont<strong>in</strong>uity with its suppliers and customers wherever it does bus<strong>in</strong>ess.This report covers many of today’s supply cha<strong>in</strong> security challenges and highlights issues governments and bus<strong>in</strong>essesface as <strong>the</strong>y ponder supply cha<strong>in</strong> security <strong>in</strong>vestment strategies. And it offers advice on how to use <strong>in</strong>vestments<strong>in</strong> new security programs to improve <strong>the</strong> efficiency, flexibility, and resilience of <strong>the</strong> supply cha<strong>in</strong>.We trust this report will be a catalyst for leadership and fresh th<strong>in</strong>k<strong>in</strong>g, and more research and learn<strong>in</strong>g, by <strong>the</strong> publicand private sectors to susta<strong>in</strong> global supply cha<strong>in</strong> security. We are mak<strong>in</strong>g progress, but <strong>the</strong>re is still much to do.Paul LawrencePartner-<strong>in</strong>-ChargeIBM Center for The Bus<strong>in</strong>ess of Governmentpaul.lawrence@us.ibm.comTheo FletcherVice President, <strong>Supply</strong> Cha<strong>in</strong> Compliance,<strong>Security</strong> and DiversityIBM Integrated <strong>Supply</strong> Cha<strong>in</strong><strong>the</strong>of@us.ibm.comwww.bus<strong>in</strong>essofgovernment.org 3


INVESTING IN SUPPLY CHAIN SECURITYE X E C U T I V E S U M M A R YThe unth<strong>in</strong>kable is that a weapon of mass destructionis smuggled through <strong>the</strong> trade and transportationsystem via an unsuspect<strong>in</strong>g company’s supplycha<strong>in</strong> <strong>in</strong>to a country that is <strong>the</strong> target of <strong>in</strong>ternationalterrorism. The potential short- and long-termdamage <strong>in</strong> terms of life and economic activity isunfathomable and <strong>in</strong>calculable. We know that freemarkets are <strong>the</strong> targets of terrorists. Osama B<strong>in</strong> Ladenhas said so himself. The United States and o<strong>the</strong>rgovernments have taken steps to secure <strong>the</strong> <strong>in</strong>ternationaltransportation systems and <strong>in</strong>ternationalsupply cha<strong>in</strong>s. However, because of <strong>the</strong> worldwidereach of <strong>in</strong>ternational trade and <strong>the</strong> sheer numberof <strong>the</strong> components of trade transactions, <strong>the</strong> systemsrema<strong>in</strong> vulnerable to an attack by terrorists on <strong>the</strong>systems <strong>the</strong>mselves or to be<strong>in</strong>g used to <strong>in</strong>troduce aweapon of mass destruction (WMD) or o<strong>the</strong>r implementof catastrophic terrorism <strong>in</strong>to <strong>the</strong> target nation.The danger of a terrorist attack <strong>in</strong>volv<strong>in</strong>g <strong>the</strong> <strong>in</strong>ternationaltransportation system rema<strong>in</strong>s high. An attackcould take place anywhere <strong>in</strong> <strong>the</strong> world and wouldhave impact well beyond <strong>the</strong> location of <strong>the</strong> attack.Because of <strong>the</strong> reach and complexity of <strong>the</strong> <strong>in</strong>ternationalsupply cha<strong>in</strong>, it is difficult for governmentsto mandate and achieve <strong>in</strong>creased supply cha<strong>in</strong>security through traditional regulatory methods. Itis nearly impossible to design security regulationsthat can rationally improve security throughout <strong>the</strong>wide range of activities that constitute <strong>in</strong>ternationaltrade. Regulations govern<strong>in</strong>g security and movementsthrough <strong>in</strong>ternational supply cha<strong>in</strong>s add costand complexity to <strong>the</strong> systems. The modern supplycha<strong>in</strong> is already a complex and <strong>in</strong>terrelated network<strong>in</strong>volv<strong>in</strong>g <strong>the</strong> movement of goods, services, funds,and <strong>in</strong>formation among a wide range of participants.A real danger is that government actions may bewell <strong>in</strong>tended yet may actually dim<strong>in</strong>ish trade efficiencywithout achiev<strong>in</strong>g genu<strong>in</strong>e improvements <strong>in</strong>supply cha<strong>in</strong> security.Any government with a stake <strong>in</strong> <strong>in</strong>ternational tradethat stands by without tak<strong>in</strong>g measures to improve<strong>the</strong> security of <strong>in</strong>ternational trade imposes enormousrisks on its citizens and its economy. Nei<strong>the</strong>r canbus<strong>in</strong>esses afford to do noth<strong>in</strong>g to protect <strong>the</strong>iremployees, <strong>the</strong>ir company, <strong>the</strong>ir customers, and <strong>the</strong>public from <strong>the</strong> use of <strong>the</strong>ir supply cha<strong>in</strong>s to launcha terrorist attack.Government and bus<strong>in</strong>ess managers also need tobe aware of <strong>the</strong>ir personal responsibility <strong>in</strong> protect<strong>in</strong>g<strong>in</strong>ternational supply cha<strong>in</strong>s. An attack launchedthrough a supply cha<strong>in</strong> could damage <strong>the</strong> credibilityand political <strong>in</strong>terests of a government. In this situation,private sector officials, <strong>in</strong> a legal and socialenvironment of hold<strong>in</strong>g corporate officials personallyliable for <strong>the</strong> actions of <strong>the</strong>ir firms, could bedeemed responsible should <strong>the</strong>ir firm’s supply cha<strong>in</strong>be compromised. The reputation of <strong>the</strong> government,<strong>the</strong> firm, and <strong>the</strong> <strong>in</strong>dividual executives could be irredeemablydamaged. A key question, <strong>the</strong>n, is: Can<strong>the</strong> government and private sector collaborate <strong>in</strong> away that achieves substantial improvements <strong>in</strong> supplycha<strong>in</strong> security and enables private sector firmsto reduce <strong>the</strong>ir overall cost and improve efficiency?This leads to a discussion of <strong>the</strong> collateral benefitsthat may flow to <strong>the</strong> firm from <strong>in</strong>vestments <strong>in</strong> security.That is, are <strong>the</strong>re benefits to a firm <strong>in</strong> additionto <strong>the</strong> improvements <strong>in</strong> security that exceed <strong>the</strong> costsof <strong>in</strong>vestment <strong>in</strong> security? From <strong>the</strong> perspective of<strong>the</strong> public sector, can voluntary programs be createdthat are aimed at maximiz<strong>in</strong>g <strong>the</strong> collateral benefitsthat firms might achieve as a result of compliance with<strong>the</strong> program requirements? Might <strong>the</strong> development4IBM Center for The Bus<strong>in</strong>ess of Government


INVESTING IN SUPPLY CHAIN SECURITYof collateral benefits serve as a catalyst to improve<strong>the</strong> safety of <strong>the</strong> public and to br<strong>in</strong>g greater visibilityand efficiency <strong>in</strong> <strong>the</strong> operation of supply cha<strong>in</strong>s?There has been a great deal of speculation <strong>in</strong> this area,but <strong>the</strong>re is very little data. Our work is <strong>in</strong>tendedto build a framework for executives, researchers,and government officials to ask questions, conductresearch, and make decisions about how to approach<strong>in</strong>vestments <strong>in</strong> supply cha<strong>in</strong> security. Firms that derivecollateral benefits from <strong>in</strong>vestments <strong>in</strong> security mayvery well have a competitive advantage over firmsthat <strong>in</strong>vest <strong>in</strong> security but do not do so <strong>in</strong> a way thatcreates collateral benefits. Governments that createvoluntary public/private partnerships that enhancesecurity, maximiz<strong>in</strong>g <strong>the</strong> opportunity for firms toachieve collateral benefits, may achieve higher degreesof improvements <strong>in</strong> security with lower costs to <strong>the</strong>governments and <strong>the</strong> firms.Look<strong>in</strong>g <strong>in</strong>to <strong>the</strong> future, perhaps <strong>the</strong> most significantcollateral benefit of <strong>in</strong>vestments <strong>in</strong> security is <strong>the</strong>development of a firm’s ability to cont<strong>in</strong>ue operations—supplycha<strong>in</strong> cont<strong>in</strong>uity—so that it mayma<strong>in</strong>ta<strong>in</strong> its economic livelihood <strong>in</strong> <strong>the</strong> face ofa significant disruption. This entails <strong>the</strong> ability toachieve dynamic processes for manag<strong>in</strong>g <strong>the</strong> firm’ssupply cha<strong>in</strong>s and <strong>the</strong> ability to respond quickly andwith resilience to changes <strong>in</strong> <strong>the</strong> external environment,irrespective of <strong>the</strong> nature of <strong>the</strong> disruption.That will be <strong>the</strong> dom<strong>in</strong>ion of forward-look<strong>in</strong>g companiesthat plan to operate successfully <strong>in</strong> a veryunstable environment.There needs to be a warn<strong>in</strong>g label that comeswith <strong>the</strong> pursuit of collateral benefits: Not all collateralbenefits accrue to a firm automatically from<strong>in</strong>vestments <strong>in</strong> security. As noted <strong>in</strong> this report, <strong>the</strong>creation of collateral benefits relates to a varietyof factors, <strong>in</strong>clud<strong>in</strong>g <strong>the</strong> firm’s approach to riskmanagement and supply cha<strong>in</strong> security and how itdeterm<strong>in</strong>es its <strong>in</strong>vestment options and builds l<strong>in</strong>kagesfrom security to o<strong>the</strong>r benefits <strong>in</strong> <strong>the</strong> operationof <strong>the</strong> supply cha<strong>in</strong>. The next steps from a bus<strong>in</strong>essperspective are to develop <strong>the</strong> metrics to gauge<strong>the</strong> actual relationship between <strong>the</strong> <strong>in</strong>vestment <strong>in</strong>security and <strong>the</strong> return on <strong>the</strong> <strong>in</strong>vestment, and froma research perspective to capture <strong>the</strong> necessarydata to document <strong>the</strong> actual dynamics associatedwith identify<strong>in</strong>g and captur<strong>in</strong>g collateral benefits.Government officials may use this research todevelop approaches to trade and transportationsecurity that <strong>in</strong>crease security, protect <strong>the</strong> public,and provide a platform for <strong>in</strong>creased efficiencywith<strong>in</strong> <strong>in</strong>ternational supply cha<strong>in</strong>s.www.bus<strong>in</strong>essofgovernment.org 5


INVESTING IN SUPPLY CHAIN SECURITYIntroductionAbout <strong>the</strong> ReportThis report expands on <strong>the</strong> emerg<strong>in</strong>g concept ofcollateral benefits derived from mak<strong>in</strong>g supplycha<strong>in</strong> security (SCS) <strong>in</strong>vestments. While this is nota new concept <strong>in</strong> <strong>the</strong>ory, it is one that is new <strong>in</strong>practice, and to date <strong>the</strong>re are limited citations oforganizations deriv<strong>in</strong>g collateral benefits from SCS<strong>in</strong>vestments. The good news, however, is that <strong>the</strong>reis <strong>in</strong>creas<strong>in</strong>g evidence and logic that <strong>supports</strong> <strong>the</strong>likelihood that mean<strong>in</strong>gful benefits are created fromprudent SCS <strong>in</strong>vestments.A key goal <strong>in</strong> this focused report is to help managersth<strong>in</strong>k clearly about <strong>the</strong> security issues <strong>the</strong>y face with<strong>in</strong><strong>the</strong>ir supply cha<strong>in</strong>s. In addition, it should help <strong>the</strong>mconsider how <strong>in</strong>vestments <strong>in</strong> <strong>in</strong>creased security mightachieve o<strong>the</strong>r beneficial results for <strong>the</strong> company,and how governments, work<strong>in</strong>g through <strong>the</strong> regulatoryprocess and creat<strong>in</strong>g public/private partnerships,can enhance supply cha<strong>in</strong> security.In cover<strong>in</strong>g collateral benefits from supply cha<strong>in</strong>security <strong>in</strong>vestments, <strong>the</strong> report focuses on supplycha<strong>in</strong> security <strong>in</strong>vestments that have shown promiseto create collateral benefits. While a more comprehensiveassessment of supply cha<strong>in</strong> security returnon <strong>in</strong>vestment (ROI) would be useful, this workcovers <strong>the</strong> aspect that represents newly emerg<strong>in</strong>gbenefits that should be considered when build<strong>in</strong>ga bus<strong>in</strong>ess case for mak<strong>in</strong>g supply cha<strong>in</strong> security<strong>in</strong>vestments.The report utilizes data from an ongo<strong>in</strong>g research<strong>in</strong>itiative at MIT called “<strong>Supply</strong> Cha<strong>in</strong> Responseto Terrorism,” which <strong>in</strong>cluded several sets of semistructured<strong>in</strong>terviews with senior supply cha<strong>in</strong> andsecurity leaders from global shippers and carrierfirms operat<strong>in</strong>g global supply cha<strong>in</strong>s. Although <strong>the</strong><strong>in</strong>terviews were conducted <strong>in</strong> <strong>the</strong> United States, <strong>the</strong>firms provided a global perspective given <strong>the</strong> worldwidenature of <strong>the</strong>ir supply cha<strong>in</strong>s.Global <strong>Supply</strong> Cha<strong>in</strong> Vulnerabilityand <strong>Security</strong>Bus<strong>in</strong>ess managers throughout <strong>the</strong> world haverecently become sensitized to <strong>the</strong> vulnerability of<strong>the</strong>ir supply cha<strong>in</strong>s to an ever-<strong>in</strong>creas<strong>in</strong>g range ofsecurity breaches and disruptions that affect globalsupply cha<strong>in</strong>s. Many po<strong>in</strong>t to <strong>the</strong> terrorist attackson September 11, 2001, but closer analysis revealsa recent series of security breaches and disruptionsthat threaten national security for many nations. TheOctober 2002 U.S. west coast longshoremen’s lockout,utility failures <strong>in</strong> <strong>the</strong> U.S. and Europe <strong>in</strong> 2003,<strong>the</strong> Madrid bomb<strong>in</strong>g, and <strong>the</strong> tsunami <strong>in</strong> 2004 allillustrate <strong>the</strong> <strong>in</strong>herent vulnerability that exists <strong>in</strong>global supply cha<strong>in</strong>s, and <strong>the</strong> global scope andscale of impact.Consider <strong>the</strong> value of <strong>in</strong>ternational trade to <strong>the</strong>world economy toge<strong>the</strong>r with <strong>the</strong> global supplycha<strong>in</strong>s that are deliver<strong>in</strong>g <strong>the</strong> trade, and one canrecognize how our economies are especially vulnerableto disruptions, whe<strong>the</strong>r <strong>the</strong>y are from a terroristattack, a natural disaster, an <strong>in</strong>frastructure failure, ora bus<strong>in</strong>ess collapse. These pr<strong>in</strong>ciples drive <strong>the</strong> basisfor a “new normalcy” <strong>in</strong> <strong>in</strong>ternational trade wheresecurity plays an <strong>in</strong>creas<strong>in</strong>gly critical role, and entailsnot only physical security of <strong>the</strong> supply cha<strong>in</strong> but<strong>the</strong> ability of firms and nations to cont<strong>in</strong>ue trad<strong>in</strong>g<strong>in</strong> <strong>the</strong> face of <strong>the</strong> security vulnerabilities, previouslynoted as supply cha<strong>in</strong> cont<strong>in</strong>uity. 16IBM Center for The Bus<strong>in</strong>ess of Government


INVESTING IN SUPPLY CHAIN SECURITYMak<strong>in</strong>g <strong>the</strong> Case for <strong>Supply</strong> Cha<strong>in</strong><strong>Security</strong> InvestmentsWith a clear need for <strong>in</strong>creased security <strong>in</strong> globalsupply cha<strong>in</strong>s, firms are tasked to make appropriatesupply cha<strong>in</strong> security <strong>in</strong>vestments 2 to protect <strong>the</strong>irassets and operations. Yet, a unique characteristicabout security <strong>in</strong>vestments is that <strong>the</strong>y defy manytraditional methods of calculat<strong>in</strong>g ROI if firms onlyconsider cost avoidance.<strong>Security</strong> <strong>in</strong>vestments by <strong>the</strong>ir nature do not directly<strong>in</strong>crease revenues but are <strong>in</strong>tended to preventcosts—when effective, supply cha<strong>in</strong> security measuresprevent disruptions, supply cha<strong>in</strong> securitybreaches, product adulteration, and brand/franchisedestruction. In most cases, it is difficult at best toprove that a specific action prevented a problemfrom occurr<strong>in</strong>g, much less how frequently <strong>the</strong> problemwould occur or <strong>the</strong> costs that were prevented.Aside from <strong>the</strong>ft reduction, where <strong>the</strong>re is tangibleevidence of improvements when loss levels arereduced, one cannot measure <strong>the</strong> cost of a securitybreach or disruption that did not occur. Ironically,only when a security measure fails can one calculate<strong>the</strong> cost of <strong>the</strong> loss for that particular <strong>in</strong>cident.Theoretically, one could better understand and predict<strong>the</strong> cost impact of security breaches by study<strong>in</strong>gsecurity breaches and <strong>the</strong> subsequent costsand losses on a broad, <strong>in</strong>dustry-wide scale. Suchdata could be used to create a probability distributionfunction that approximates a predictable set oflosses across <strong>in</strong>dustry. Sadly, this data is not widelyavailable for various reasons, mostly because firmsbelieve that <strong>the</strong>y expose <strong>the</strong>mselves to additionalcosts and risks by shar<strong>in</strong>g this data. Shar<strong>in</strong>g <strong>the</strong>irloss data and experiences opens up <strong>the</strong> firm to additionalrisks: Expos<strong>in</strong>g <strong>the</strong> loss data may make securityweaknesses more evident to <strong>the</strong> general public,which may result <strong>in</strong> fur<strong>the</strong>r losses; expos<strong>in</strong>g actuallosses may lead to higher <strong>in</strong>surance premiums as<strong>in</strong>surers would adjust premiums to more accuratelyreflect <strong>the</strong> higher loss levels; firms may fear reducedaccess to capital if expos<strong>in</strong>g loss data causes negativepublic perception of <strong>the</strong>ir operations.As one <strong>in</strong>dustrial executive noted, <strong>the</strong> benefits ofsecurity <strong>in</strong>vestments are often <strong>in</strong> <strong>the</strong> form of avoid<strong>in</strong>glosses, say<strong>in</strong>g “nobody gets credit for solv<strong>in</strong>gproblems that did not happen,” 3 as suggested previously.The benefits are difficult to measure if <strong>the</strong>avoided costs are not <strong>in</strong>curred. This reflects a challengeto <strong>the</strong> bus<strong>in</strong>ess to identify and value realsav<strong>in</strong>gs from avoid<strong>in</strong>g a security breach. Some progresshas been made quantify<strong>in</strong>g <strong>the</strong> benefit fromprevent<strong>in</strong>g supply cha<strong>in</strong> disruptions, but more workis needed to make <strong>the</strong> same progress quantify<strong>in</strong>g <strong>the</strong>benefits of prevent<strong>in</strong>g supply cha<strong>in</strong> security breaches.With <strong>the</strong>se fundamental constra<strong>in</strong>ts, bus<strong>in</strong>ess leadersand security managers have had limited successquantify<strong>in</strong>g <strong>the</strong> bus<strong>in</strong>ess case to fund desirablesecurity <strong>in</strong>vestments, leav<strong>in</strong>g supply cha<strong>in</strong>s know<strong>in</strong>glyvulnerable.An emerg<strong>in</strong>g and more powerful way of view<strong>in</strong>greturn on <strong>in</strong>vestment for supply cha<strong>in</strong> security<strong>in</strong>vestments entails consider<strong>in</strong>g more than just costavoidance benefits. Some firms are recogniz<strong>in</strong>g <strong>the</strong>potential to extend beyond cost avoidance benefitsto actually capture cost reduction and efficiencyimprovements from those same <strong>in</strong>vestments. Thesemay be possible by consider<strong>in</strong>g <strong>the</strong> impact of <strong>the</strong>se<strong>in</strong>vestments on supply cha<strong>in</strong> operations, and subsequentlydesign<strong>in</strong>g those operations to leverage <strong>the</strong><strong>in</strong>vestments for process improvement. Those firmspursu<strong>in</strong>g this approach have begun to identifyand enjoy collateral benefits of <strong>the</strong>ir <strong>in</strong>vestments.ACSCBPC-TPATGPSOS&DRFIDROISCSTQMAcronyms & AbbreviationsAutomated Commercial SystemU.S. Customs and Border ProtectionU.S. Customs-Trade PartnershipAga<strong>in</strong>st TerrorismGlobal Position<strong>in</strong>g SystemsOverages, Shortages, and DamagesRadio Frequency Identificationreturn on <strong>in</strong>vestmentsupply cha<strong>in</strong> securityTotal Quality Managementwww.bus<strong>in</strong>essofgovernment.org 7


INVESTING IN SUPPLY CHAIN SECURITY<strong>Collateral</strong> <strong>Benefits</strong>: A Promis<strong>in</strong>gApproach to ROIOne promis<strong>in</strong>g approach for build<strong>in</strong>g a bus<strong>in</strong>esscase for supply cha<strong>in</strong> security lies <strong>in</strong> <strong>the</strong> possibilitythat supply cha<strong>in</strong> security <strong>in</strong>vestments may providevaluable benefits <strong>in</strong> o<strong>the</strong>r areas <strong>in</strong> <strong>the</strong> firm, and viceversa. These “collateral benefits” (also known as<strong>in</strong>direct or “dual benefits”) can possibly enhancea bus<strong>in</strong>ess case to <strong>in</strong>crease <strong>the</strong> return on <strong>in</strong>vestmentfor firms <strong>in</strong>terested <strong>in</strong> reduc<strong>in</strong>g <strong>the</strong>ir vulnerability.At this time, <strong>the</strong> data on actual collateral benefitsresult<strong>in</strong>g from SCS <strong>in</strong>vestments is sparse. To date,little work has been done to understand <strong>the</strong> variousaspects and issues associated with creat<strong>in</strong>g collateralbenefits, although some 4 have recognized<strong>the</strong> existence and value of creat<strong>in</strong>g <strong>the</strong>se collateralbenefits.Firms need to develop economic justifications for<strong>the</strong>ir <strong>in</strong>vestments <strong>in</strong> mak<strong>in</strong>g <strong>the</strong> supply cha<strong>in</strong> secureand resilient; understand<strong>in</strong>g <strong>the</strong> dynamics and issuesrelated to creat<strong>in</strong>g collateral benefits may providea valuable <strong>in</strong>vestment <strong>in</strong>centive to justify those<strong>in</strong>vestments. Just as Phil Crosby believed that quality<strong>in</strong>vestments provide collateral benefits that offset <strong>the</strong><strong>in</strong>vestments <strong>in</strong> quality, so too we suggest <strong>the</strong> possibilitythat security <strong>in</strong>vestments may generate collateralbenefits that may exceed <strong>the</strong> cost of <strong>the</strong> security<strong>in</strong>vestments. Will we f<strong>in</strong>d that “security is free”? 5The Major <strong>Collateral</strong> Benefit:Facilitat<strong>in</strong>g TradePerhaps <strong>the</strong> most important potential collateral benefitthat may develop from mak<strong>in</strong>g security systemimprovements is <strong>in</strong> facilitat<strong>in</strong>g trade. While a primary<strong>in</strong>tention of <strong>the</strong> <strong>in</strong>vestments noted is to make<strong>the</strong> supply cha<strong>in</strong> secure, by virtue of mak<strong>in</strong>g <strong>the</strong>supply cha<strong>in</strong> secure it becomes less prone to disruption.In some cases, it also helps <strong>the</strong> supply cha<strong>in</strong>become more capable of withstand<strong>in</strong>g and bounc<strong>in</strong>gback from a disruption.While this may seem <strong>in</strong>tuitive and a non-starter,only when one considers <strong>the</strong> potential loss from notbe<strong>in</strong>g able to trade does one beg<strong>in</strong> to appreciate <strong>the</strong>impact. Us<strong>in</strong>g <strong>the</strong> U.S. west coast longshoremen’slockout of 2002 as an example, <strong>the</strong> economic impacton <strong>the</strong> U.S. economy has been estimated at between$10 billion and $20 billion—this for a 10-day lockoutof only some of <strong>the</strong> U.S. ports of entry, and onewhere <strong>the</strong> disruption was known about <strong>in</strong> advanceand well anticipated. One can easily estimate that<strong>the</strong> impact would have been factors higher (if notexponentially higher) if all <strong>the</strong> ports were closedwithout notice. How much could <strong>the</strong> economy withstandbefore collaps<strong>in</strong>g? At <strong>the</strong> firm level, a numberof examples illustrate <strong>the</strong> magnitude of <strong>the</strong> risk ofdisruption to bus<strong>in</strong>ess operations and <strong>the</strong> ability toconduct trade.The terrorist attacks on September 11, 2001, haddramatic and last<strong>in</strong>g effects on automotive manufacturersdependent on not quite just-<strong>in</strong>-time deliveriesacross <strong>the</strong> U.S.-Canadian border, shutt<strong>in</strong>gdown five Ford Motor Company plants <strong>in</strong> <strong>the</strong> U.S.,for example. 6A recent study 7 of 861 firms over a n<strong>in</strong>e-year periodof time illustrates <strong>the</strong> significant impact of supplycha<strong>in</strong> glitches on firm valuation: Each glitch hada last<strong>in</strong>g impact on <strong>the</strong> stock valuation of publiclytraded firms, calculated to be a permanent loss ofapproximately 9 percent of <strong>the</strong> stock valuation afterannouncement of <strong>the</strong> glitch. “This translates <strong>in</strong>to8IBM Center for The Bus<strong>in</strong>ess of Government


INVESTING IN SUPPLY CHAIN SECURITYan average destruction <strong>in</strong> shareholder value <strong>in</strong> 1998dollars of about US$130 million per glitch. For <strong>the</strong>861 glitches <strong>in</strong> <strong>the</strong> sample, this amounts to an overalldestruction <strong>in</strong> shareholder value of about US$112billion.” 8A now-famous lightn<strong>in</strong>g bolt at a radio frequencychip plant <strong>in</strong> New Mexico virtually started a cha<strong>in</strong>of events that resulted <strong>in</strong> Ericsson’s eventual departurefrom <strong>the</strong> cellular phone production bus<strong>in</strong>ess. 9The case presents a unique side-by-side comparisonof how two firms (Ericsson and Nokia) were ableto respond to a situation and how <strong>the</strong> preparedness,systems, and organizational capabilities were <strong>the</strong>differentiat<strong>in</strong>g factors <strong>in</strong> <strong>the</strong>ir starkly different performance.While a number of factors contributed to<strong>the</strong> demise of Ericsson’s cellular phone bus<strong>in</strong>ess,<strong>the</strong>ir lack of a sens<strong>in</strong>g, aware, and responsive organization—andNokia’s highly sens<strong>in</strong>g, communicative,and aware organization—determ<strong>in</strong>ed <strong>the</strong>outcome of <strong>the</strong> disruption, with <strong>the</strong> viability of <strong>the</strong>firm clearly at stake.A grow<strong>in</strong>g number of examples could be usedto make <strong>the</strong> po<strong>in</strong>t—secure supply cha<strong>in</strong>s enablefirms to cont<strong>in</strong>ue exchang<strong>in</strong>g goods and services,creat<strong>in</strong>g a healthy economy. Without <strong>the</strong> abilityto source, produce, and distribute product to customerdemand, <strong>the</strong>re would be no economy.Options to Create Additional<strong>Collateral</strong> <strong>Benefits</strong>Firms have a variety of <strong>in</strong>vestment options availableto improve <strong>the</strong>ir supply cha<strong>in</strong> security. The boxbelow provides an overview of a range of security<strong>in</strong>vestments offer<strong>in</strong>g collateral benefits, and Table A.1<strong>in</strong> <strong>the</strong> Appendix provides a more complete version,also show<strong>in</strong>g <strong>the</strong> direct and collateral benefits associatedwith <strong>the</strong>se <strong>in</strong>vestments. The Appendix isdesigned to portray a range of security <strong>in</strong>vestmentoptions and <strong>the</strong> associated broad range of anticipatedcollateral benefits. It is notable that a firm may createsimilar collateral benefits by mak<strong>in</strong>g different supplycha<strong>in</strong> security <strong>in</strong>vestments. Therefore, <strong>the</strong> table providesguidel<strong>in</strong>es for understand<strong>in</strong>g <strong>the</strong> potential collateralbenefits available prior to mak<strong>in</strong>g an <strong>in</strong>vestmentdecision, to maximize <strong>the</strong> potential collateral benefitsand <strong>the</strong> subsequent return on <strong>in</strong>vestment. Each entry<strong>in</strong> <strong>the</strong> table will be addressed <strong>in</strong> subsequent sections.<strong>Collateral</strong> <strong>Benefits</strong> from AssetVisibility and Track<strong>in</strong>gFirms can make a number of <strong>in</strong>vestments that providevary<strong>in</strong>g levels of asset visibility and track<strong>in</strong>g.Asset visibility provides constant access to locationand product status, which may reduce <strong>the</strong> uncerta<strong>in</strong>tyof shipment arrival. Toge<strong>the</strong>r with producttrack<strong>in</strong>g, asset visibility also provides a time-def<strong>in</strong>iteand controlled cha<strong>in</strong> of custody for conveyancesacross <strong>the</strong> supply cha<strong>in</strong>. They give firms higher levelsof security by provid<strong>in</strong>g a more consistent andpredictable flow of materials, mak<strong>in</strong>g it easier toobserve exceptions to anticipated material flows thatmay <strong>in</strong>dicate a security breach and allow<strong>in</strong>g subsequentrapid follow-up and preventative actions.With<strong>in</strong> this category of security <strong>in</strong>vestment, firmshave many choices, each with a different potentialfor creat<strong>in</strong>g collateral benefits. Global Position<strong>in</strong>gSystems (GPS) are widely used now for track<strong>in</strong>g <strong>the</strong>location of truck and rail fleets. Radio FrequencyIdentification (RFID) and Smart Conta<strong>in</strong>ers are <strong>in</strong><strong>the</strong> early stages of be<strong>in</strong>g developed for commerciallyviable applications for asset track<strong>in</strong>g.An Overview of <strong>Supply</strong> Cha<strong>in</strong> <strong>Security</strong> Investment OptionsOffer<strong>in</strong>g <strong>Collateral</strong> <strong>Benefits</strong>• Asset Visibility and Track<strong>in</strong>g• Personnel <strong>Security</strong>• Physical <strong>Security</strong>• Standards Development• Supplier Selection and Investment• Transportation and Conveyance <strong>Security</strong>• Build<strong>in</strong>g Organizational InfrastructureAwareness and Capabilities• Collaboration Among <strong>Supply</strong> Cha<strong>in</strong> Parties• Proactive Technology Investments• TQM Investments• Voluntary <strong>Security</strong> Compliancewww.bus<strong>in</strong>essofgovernment.org 9


INVESTING IN SUPPLY CHAIN SECURITYThe collateral benefits may be significant with thisset of <strong>in</strong>vestments, although <strong>the</strong>y will not be automatic.By provid<strong>in</strong>g constant access to location andproduct status, planners may be able to reduce <strong>the</strong>specified <strong>in</strong>ventory levels because <strong>the</strong>y have lessuncerta<strong>in</strong>ty <strong>in</strong> <strong>the</strong> material flows. Lower <strong>in</strong>ventorylevels and less uncerta<strong>in</strong>ty may result <strong>in</strong> lower operat<strong>in</strong>gexpenses com<strong>in</strong>g from less product handl<strong>in</strong>gand rehandl<strong>in</strong>g, which is common <strong>in</strong> distributionsystems with high levels of uncerta<strong>in</strong>ty. Achiev<strong>in</strong>g<strong>the</strong>se collateral benefits, however, will require <strong>the</strong>firm to actually reduce <strong>the</strong> <strong>in</strong>ventory levels, potentiallyreduce <strong>the</strong> planned transit times, and evenmodify transportation arrangements with third partiesto take advantage of <strong>the</strong> lower levels of uncerta<strong>in</strong>tyand potentially even fewer shipments(emergency shipments especially).<strong>Collateral</strong> <strong>Benefits</strong> from Personnel<strong>Security</strong>By focus<strong>in</strong>g on <strong>the</strong> “supply” of human resources, firmscan <strong>in</strong>crease <strong>the</strong> level of security with<strong>in</strong> <strong>the</strong> firm. Thefocus on people is one of <strong>the</strong> most fundamentallyimportant aspects of supply cha<strong>in</strong> security. This mayentail a thorough <strong>in</strong>itial background check to elim<strong>in</strong>ate“bad actors” from <strong>the</strong> hir<strong>in</strong>g pool, supplementedwith regular drug test<strong>in</strong>g and background checks. Thesewill <strong>in</strong>crease <strong>the</strong> likelihood of provid<strong>in</strong>g early warn<strong>in</strong>gabout employees operat<strong>in</strong>g under <strong>the</strong> <strong>in</strong>fluence,or early warn<strong>in</strong>g about those employees with <strong>in</strong>tenton putt<strong>in</strong>g <strong>the</strong> firm and its assets at risk. The test<strong>in</strong>gdoes come at a cost, but it has been long recognizedthat one of <strong>the</strong> most significant risk elements is “<strong>the</strong>enemy with<strong>in</strong>” <strong>the</strong> walls of <strong>the</strong> corporation.In an odd twist, it is likely that employees will placea higher value on <strong>the</strong>ir employment with <strong>the</strong> recognitionthat <strong>the</strong> firm establishes and ma<strong>in</strong>ta<strong>in</strong>s a highquality level for employees, build<strong>in</strong>g pride <strong>in</strong> <strong>the</strong>irwork and greater dedication to <strong>the</strong> firm’s objectives.Just as employees may value <strong>the</strong> high standards, sotoo will <strong>the</strong> customers appreciate <strong>the</strong> high personneland operat<strong>in</strong>g standards. Increased customer loyalty,<strong>in</strong>creased sales revenues, and higher market sharesare possible from <strong>the</strong> higher levels of employee commitmentcom<strong>in</strong>g from <strong>the</strong> firm’s efforts to ma<strong>in</strong>ta<strong>in</strong>high employee standards.<strong>Collateral</strong> <strong>Benefits</strong> from Physical<strong>Security</strong>Physical security is commonly one of <strong>the</strong> first security<strong>in</strong>itiatives that firms undertake to improve systemsecurity. Physically prevent<strong>in</strong>g access andcontroll<strong>in</strong>g access keeps out unauthorized personnel,protect<strong>in</strong>g site <strong>in</strong>tellectual property, capitalequipment, personnel, <strong>in</strong>ventory, work <strong>in</strong> progress,f<strong>in</strong>ished goods, and product <strong>in</strong>tegrity. Traditionalapproaches to security have focused on <strong>the</strong>ft reduction,which entails protect<strong>in</strong>g aga<strong>in</strong>st <strong>the</strong> unauthorizedremoval of items from <strong>the</strong> process. Physicalsecurity <strong>in</strong>vestments often focus on local site securityand not system-wide security. The new securityparadigm, however, now requires <strong>in</strong>verse th<strong>in</strong>k<strong>in</strong>gby develop<strong>in</strong>g systems that prevent <strong>the</strong> addition ofunauthorized items <strong>in</strong>to <strong>the</strong> supply process.These <strong>in</strong>vestments may provide o<strong>the</strong>r benefits aswell, <strong>in</strong>clud<strong>in</strong>g <strong>in</strong>creas<strong>in</strong>g process efficiency throughtechnology adoption (e.g., automated process<strong>in</strong>gand identification through technologies like radiofrequency identification), and reduc<strong>in</strong>g Overages,Shortages, and Damages (OS&D) from potentiallyfewer handoffs and more automated handl<strong>in</strong>g.These lower loss levels may generate <strong>the</strong>ir own collateralbenefits. With lower loss levels, <strong>in</strong>surancerates will likely drop because of <strong>the</strong> reduced likelihoodof loss, and firms can expect lower <strong>in</strong>directcosts (short-term adm<strong>in</strong>istration costs and long-termexpenses) that are not reimbursed by typical <strong>in</strong>surancepolicies. 10For firms regularly host<strong>in</strong>g customers on site,a more secure environment certa<strong>in</strong>ly provides fora much more favorable experience and builds confidence<strong>in</strong> <strong>the</strong> supplier selection, <strong>in</strong>creas<strong>in</strong>gly <strong>the</strong>likelihood of cont<strong>in</strong>ued bus<strong>in</strong>ess and return visitsby customers.<strong>Collateral</strong> <strong>Benefits</strong> from StandardsDevelopmentFirms often <strong>in</strong>vest resources <strong>in</strong> build<strong>in</strong>g <strong>in</strong>dustryoperat<strong>in</strong>g coord<strong>in</strong>ation and security standards. Thesepay many direct benefits, mak<strong>in</strong>g it easier to coord<strong>in</strong>atemulti-company security activities (<strong>in</strong>itiatives,st<strong>in</strong>g operations, <strong>in</strong>cident <strong>in</strong>vestigations), mak<strong>in</strong>g10IBM Center for The Bus<strong>in</strong>ess of Government


INVESTING IN SUPPLY CHAIN SECURITYsecurity breaches easier to spot, mak<strong>in</strong>g for higherlevels of security, and ultimately improv<strong>in</strong>g <strong>the</strong> securityof <strong>the</strong> entire system, not just <strong>the</strong> <strong>in</strong>dividual firm.Standards may help reduce non-security lossesthrough processes that entail systems-wide awarenessand <strong>in</strong>centives and practices oriented towardsecurity. The benefits surface <strong>in</strong> non-security lossreduction such as reduced counterfeit and “graymarket” shipments. As one global logistics securitymanager said, “We’re structured as a group with<strong>in</strong>[<strong>the</strong> firm] to try and delve <strong>in</strong>to more of those bus<strong>in</strong>essissues that are out <strong>the</strong>re—counterfeit, graymarket, supply cha<strong>in</strong>, warranty fraud, etc., wherethrough some of our efforts we’ve been able to showa return to <strong>the</strong> bottom l<strong>in</strong>e....”Beyond <strong>the</strong>se direct benefits, develop<strong>in</strong>g standardsmay also generate potential collateral benefits. Byhav<strong>in</strong>g standards for security, coord<strong>in</strong>ation, andoperation, firms may f<strong>in</strong>d improved efficiency <strong>in</strong>various logistics operations, potentially result<strong>in</strong>g <strong>in</strong>reduced shipp<strong>in</strong>g times. Industry standards oftenlead to higher levels of process discipl<strong>in</strong>e that arenecessary for <strong>in</strong>tercompany operations, lead<strong>in</strong>g tohigher performance levels from fewer process deviationsand <strong>in</strong>creased process predictability.<strong>Security</strong>Investment Direct <strong>Benefits</strong> <strong>Collateral</strong> <strong>Benefits</strong>Asset Visibilityand Track<strong>in</strong>g• Provide positive locationstatus, prevent<strong>in</strong>g excursions• Provide time-def<strong>in</strong>ite andcontrolled cha<strong>in</strong> of custody• Lower <strong>the</strong>ft and losses• Faster recalls• Fewer delayed shipments• Better plann<strong>in</strong>g, enabl<strong>in</strong>g lower work<strong>in</strong>g capital for<strong>in</strong>ventory• Less Overages, Shortages, and Damages (OS&D)• Protection of brand namePersonnel<strong>Security</strong>Physical <strong>Security</strong>StandardsDevelopment• Thorough background checkelim<strong>in</strong>ates “bad actors” fromhir<strong>in</strong>g pool• Regular background checksprovide early warn<strong>in</strong>g foremployees operat<strong>in</strong>g under<strong>the</strong> <strong>in</strong>fluence• Controlled access keeps outunauthorized personnel• Protection of <strong>in</strong>tellectualproperty• Protection of capital equipmentand personnel• Protection of product <strong>in</strong>tegrity• Facilitate coord<strong>in</strong>ation ofmulti-company security activities(<strong>in</strong>itiatives, st<strong>in</strong>g operations,<strong>in</strong>cident <strong>in</strong>vestigations)• <strong>Security</strong> breaches easier tospot with standard systems• Higher levels of security withcommon procedures• System-level and suppliersecurity improvement• Customer loyalty, <strong>in</strong>creased sales revenues, highermarket share• Employee commitment and belief <strong>in</strong> company’sconcern for employee• Customer recognition of firm’s safe and secure environmentas an expertise, <strong>in</strong>creas<strong>in</strong>g customer loyalty• Fewer <strong>the</strong>fts and OS&D by virtue of hav<strong>in</strong>g moresecure facility• Reduced equipment damage and operat<strong>in</strong>g costs(lower <strong>in</strong>surance rates)• Fewer safety <strong>in</strong>cidents and catastrophes• Improve <strong>the</strong> efficiency of ship, tra<strong>in</strong>, truck, term<strong>in</strong>aloperations; cuts <strong>in</strong>ternational shipp<strong>in</strong>g times• Platform for collaboration with<strong>in</strong> an <strong>in</strong>dustry lead<strong>in</strong>gto standards that raise level of performance• Process discipl<strong>in</strong>e enables compliance (quality, safety,process), higher performance• Common processes reduce confusion, raise predictability,improve staff backup• Reduce non-security losseswww.bus<strong>in</strong>essofgovernment.org 11


INVESTING IN SUPPLY CHAIN SECURITY<strong>Collateral</strong> <strong>Benefits</strong> from SupplierSelection and Investment<strong>Invest<strong>in</strong>g</strong> <strong>in</strong> secure suppliers is a fundamentalsource of supply cha<strong>in</strong> security. It is difficult tooverstate <strong>the</strong> importance of <strong>the</strong> security of <strong>the</strong>firm’s suppliers, and suppliers throughout <strong>the</strong>supply cha<strong>in</strong>, <strong>in</strong>clud<strong>in</strong>g those upstream from<strong>the</strong> tier-one supplier. This comes as a result of<strong>the</strong> <strong>in</strong>creas<strong>in</strong>g <strong>in</strong>terdependencies among supplycha<strong>in</strong> parties, particularly as firms outsourcemore activities to third parties, <strong>in</strong>herentlybr<strong>in</strong>g<strong>in</strong>g <strong>in</strong> greater risk of security breach.End-to-end supply cha<strong>in</strong> security is <strong>the</strong>reforeof fundamental importance to overall supplycha<strong>in</strong> security.Basic expectation shar<strong>in</strong>g, supplier site visits, andsecurity audits <strong>in</strong>crease <strong>the</strong> likelihood of higherlevels of security <strong>in</strong> <strong>the</strong> upstream supply cha<strong>in</strong>.Additionally, firms may elect to more deeply<strong>in</strong>volve selected suppliers <strong>in</strong> tabletop and mock<strong>in</strong>cident exercises, fur<strong>the</strong>r <strong>in</strong>creas<strong>in</strong>g <strong>the</strong> upstreamsupply cha<strong>in</strong> security. Some firms consider this amandatory set of actions required to validate <strong>the</strong>supplier’s ability to ma<strong>in</strong>ta<strong>in</strong> a secure supply.While a firm may wish to trust a supplier’s <strong>in</strong>tent,<strong>the</strong> necessity is to check <strong>the</strong> supplier’s capabilities.Aside from ensur<strong>in</strong>g <strong>the</strong> <strong>in</strong>tegrity and un<strong>in</strong>terruptedsupply of materials, such discipl<strong>in</strong>e also provides<strong>the</strong> firm with a direct <strong>in</strong>sight <strong>in</strong>to <strong>the</strong> supplier’sability to ma<strong>in</strong>ta<strong>in</strong> a supply <strong>in</strong> a potential securitybreach or disruption.Focus<strong>in</strong>g on supplier security also <strong>in</strong>doctr<strong>in</strong>ates <strong>the</strong>supplier to sense security issues, provid<strong>in</strong>g an earlywarn<strong>in</strong>g system for <strong>the</strong> firm, on security issues aswell as o<strong>the</strong>r critical issues such as quality andavailability. Ultimately, <strong>the</strong>se efforts result <strong>in</strong> lowerlevels of loss, less downtime, and likely higherquality. By collaborat<strong>in</strong>g, shar<strong>in</strong>g resources, andwork<strong>in</strong>g toward common goals, firms may be ableto enjoy lower costs from reduced cargo <strong>in</strong>spections,faster throughput, jo<strong>in</strong>t plann<strong>in</strong>g, ongo<strong>in</strong>gcoord<strong>in</strong>ation, and active problem resolution. Firmsthat develop and ma<strong>in</strong>ta<strong>in</strong> a clear “secure supplier”competence ma<strong>in</strong>ta<strong>in</strong> a market<strong>in</strong>g advantage forcustomers that demand security <strong>in</strong> <strong>the</strong>ir own supplycha<strong>in</strong>s.<strong>Collateral</strong> <strong>Benefits</strong> from Transportationand Conveyance <strong>Security</strong><strong>Invest<strong>in</strong>g</strong> <strong>in</strong> secur<strong>in</strong>g transportation conveyancesmay provide significant security benefits. Theoptions <strong>in</strong>clude add<strong>in</strong>g additional drivers to avoidlong stops (“freight at rest is freight at risk”), add<strong>in</strong>gphysical security features to <strong>the</strong> conveyance (e.g.,electronic seals), and add<strong>in</strong>g visibility tools to ma<strong>in</strong>ta<strong>in</strong>known location and status (e.g., GPS and RFIDsystems). These will likely result <strong>in</strong> lower losses from<strong>the</strong>ft, fewer <strong>in</strong>cidents of product adulteration, lowerOS&D, avoidance of cargo misuse (e.g., as aweapon delivery system), and protection of <strong>the</strong> conveyanceitself.A dist<strong>in</strong>ct collateral benefit exists for <strong>the</strong> supplier <strong>in</strong>cases where <strong>the</strong> supplier develops a secure operationand leverages this as a competitive advantage.In several <strong>in</strong>stances, firms have used <strong>the</strong>ir securitypractices and orientation as a competitive advantage<strong>in</strong> captur<strong>in</strong>g additional bus<strong>in</strong>ess <strong>in</strong> <strong>the</strong> marketplace.<strong>Collateral</strong> <strong>Benefits</strong> from Build<strong>in</strong>gOrganizational InfrastructureAwareness and CapabilitiesMak<strong>in</strong>g <strong>in</strong>vestments <strong>in</strong> organizational <strong>in</strong>frastructureconstitutes a long-term approach toward build<strong>in</strong>gcapabilities <strong>in</strong> <strong>the</strong> organization through personneland organizational processes. Typical efforts might<strong>in</strong>clude <strong>in</strong>vest<strong>in</strong>g <strong>in</strong> employee education on vulnerabilityand on firm operations, build<strong>in</strong>g improvedcommunications systems, and add<strong>in</strong>g security measures<strong>in</strong>to performance assessment and <strong>in</strong>centives,among o<strong>the</strong>rs.How do <strong>the</strong>se <strong>in</strong>vestments impact security andprovide collateral benefits? As an example, regularcommunication about security issues that is woven<strong>in</strong>to daily work practices builds an awareness ofsecurity issues that translates <strong>in</strong>to quicker recognitionof security breaches and issues when <strong>the</strong>y arise.Similarly, this establishes a knowledge base <strong>in</strong> everyemployee that is broad, with each employee be<strong>in</strong>gwell <strong>in</strong>formed and aware of <strong>the</strong> broader system andits operation. This, <strong>in</strong> turn, develops employees thatare more aware of <strong>the</strong> firm’s broader bus<strong>in</strong>ess needsand issues, and hence those employees can con-12IBM Center for The Bus<strong>in</strong>ess of Government


INVESTING IN SUPPLY CHAIN SECURITY<strong>Security</strong>Investment Direct <strong>Benefits</strong> <strong>Collateral</strong> <strong>Benefits</strong>SupplierSelection andInvestment• Ensure a secure supply ofmaterials• Early warn<strong>in</strong>g of upstreamsecurity issues• Reduce upstream and<strong>in</strong>bound losses• Lower <strong>in</strong>spection costs, faster throughput• Enhanced communication via collaboration• Increase efficiency through jo<strong>in</strong>t plann<strong>in</strong>g• Utilize <strong>in</strong>ternal security resources to assist suppliers,ultimately mak<strong>in</strong>g for improved relationshipsTransportationand Conveyance<strong>Security</strong>Build<strong>in</strong>gOrganizationalInfrastructureAwareness andCapabilitiesCollaborationAmong <strong>Supply</strong>Cha<strong>in</strong> Parties• Reduce <strong>the</strong>ft losses• Reduce adulteration of product• Reduce chance of cargovessel misuse (weapondelivery system)• Protect conveyance equipment,vessels• Build awareness of securityconcerns• Increase role of security <strong>in</strong>daily operations and everyassignment• Improved coord<strong>in</strong>ationalong supply cha<strong>in</strong> <strong>in</strong>creasessecurity• Cost avoidance of non-product-related costs (<strong>in</strong>directcosts)• Crime and vandalism rates fall• Fewer disruptions to <strong>the</strong> supply cha<strong>in</strong>, more cost sav<strong>in</strong>gscompared with avoided losses• Less capital required for <strong>in</strong>ventory• Reduced transportation cycle time• Increase problem prevention through recognition byemployees• Increase early <strong>in</strong>tervention, reduc<strong>in</strong>g impact of adisruption• Improve <strong>the</strong> ability to respond with early awareness• Platform for broader alignment• Enable creation of a secure supply cha<strong>in</strong> network forcommon problem solv<strong>in</strong>g, resource shar<strong>in</strong>g• Improve communication among supply cha<strong>in</strong> partners,potentially reduc<strong>in</strong>g coord<strong>in</strong>ation costssider <strong>the</strong>m when mak<strong>in</strong>g operat<strong>in</strong>g decisions. Thelikely results are decisions that are more closelyaligned with <strong>the</strong> bus<strong>in</strong>ess needs.Specifically, organizational <strong>in</strong>frastructure <strong>in</strong>vestmentsmay <strong>the</strong>n <strong>in</strong>crease problem prevention through problemrecognition by employees. In addition, such <strong>in</strong>vestmentsmay <strong>in</strong>crease <strong>the</strong> chances that employees mayrecognize potential problems, which enables <strong>the</strong> firmto <strong>in</strong>tervene and reduce <strong>the</strong> impact and consequencesof a disruption.One firm described how <strong>the</strong>ir <strong>in</strong>frastructure <strong>in</strong>vestmentshelped build an exceptionally resilient andresponsive supply cha<strong>in</strong>. Each day employeesreceive a three- to four-m<strong>in</strong>ute security brief that is<strong>in</strong>tegrated <strong>in</strong>to a daily communications meet<strong>in</strong>g at<strong>the</strong> beg<strong>in</strong>n<strong>in</strong>g of each shift. S<strong>in</strong>ce all critical issues<strong>in</strong> <strong>the</strong> bus<strong>in</strong>ess are covered toge<strong>the</strong>r, security is recognizedon a par with <strong>the</strong> o<strong>the</strong>r key elements of <strong>the</strong>bus<strong>in</strong>ess operation. Employee performance measures<strong>in</strong>clude losses as a key element, and <strong>in</strong>centivesand rewards are offered to employees forspecific actions taken to reduce losses. 11<strong>Collateral</strong> <strong>Benefits</strong> from CollaborationAmong <strong>Supply</strong> Cha<strong>in</strong> PartiesSimilar to mak<strong>in</strong>g <strong>in</strong>vestments <strong>in</strong> organizational<strong>in</strong>frastructure, <strong>in</strong>vestments <strong>in</strong> collaboration entaila long-term approach toward build<strong>in</strong>g capabilities<strong>in</strong> <strong>the</strong> supply network through <strong>in</strong>ter-organizationalprocesses. Typical efforts might <strong>in</strong>clude <strong>in</strong>vest<strong>in</strong>g <strong>in</strong>build<strong>in</strong>g formal communication systems, facilitat<strong>in</strong>gregular <strong>in</strong>teractions between multiple levels with<strong>in</strong>each organization, 12 and conduct<strong>in</strong>g jo<strong>in</strong>t securityassessment and response plann<strong>in</strong>g. As noted previously,<strong>the</strong> collaboration among supply cha<strong>in</strong> partiesmay <strong>in</strong>clude multiple partners toge<strong>the</strong>r <strong>in</strong> tabletopand mock <strong>in</strong>cident exercises. Such proactive workfur<strong>the</strong>r <strong>in</strong>creases <strong>the</strong> awareness and likelihood of<strong>in</strong>creas<strong>in</strong>g end-to-end supply cha<strong>in</strong> security.Collaboration <strong>in</strong> <strong>the</strong> supply cha<strong>in</strong> can also be securityspecific. In some cases, firms may elect to buildsecurity <strong>in</strong>to <strong>the</strong>ir extended supply network by us<strong>in</strong>gthird parties for security contract<strong>in</strong>g. In o<strong>the</strong>r cases,firms may elect to develop long-term contracts or,perhaps more importantly, mutually agreed termswww.bus<strong>in</strong>essofgovernment.org 13


INVESTING IN SUPPLY CHAIN SECURITYand conditions among <strong>the</strong> supply cha<strong>in</strong> parties sothat <strong>the</strong> organizations can operate more efficientlyand effectively. These <strong>in</strong>vestments may also foster<strong>the</strong> development of closer relationships and moreeasily align <strong>the</strong> parties around <strong>the</strong> shared objective.This may result <strong>in</strong> higher performance levels, aswell as higher levels of awareness as each organizationdevelops a deeper understand<strong>in</strong>g of <strong>the</strong> o<strong>the</strong>r’soperat<strong>in</strong>g characteristics and needs.<strong>Collateral</strong> <strong>Benefits</strong> from ProactiveTechnology InvestmentsInvestments <strong>in</strong> technology are often praised for generat<strong>in</strong>gnumerous benefits beyond <strong>the</strong> <strong>in</strong>itial purposeof <strong>the</strong> <strong>in</strong>vestment. <strong>Invest<strong>in</strong>g</strong> <strong>in</strong> technology for securityis no different, where <strong>the</strong> <strong>in</strong>vestments create <strong>the</strong>ability to customize <strong>the</strong> application to <strong>the</strong> benefit of<strong>the</strong> firm and potentially provide visibility throughout<strong>the</strong> supply network. Visibility <strong>in</strong>vestments enable<strong>in</strong>creased real-time awareness of bus<strong>in</strong>ess operationsand better process knowledge, which <strong>in</strong> turn enables<strong>the</strong> firm to focus resources and efforts on key improvementareas, <strong>the</strong>refore reduc<strong>in</strong>g waste and <strong>in</strong>creas<strong>in</strong>gresource utilization.Two examples illustrate <strong>the</strong>se benefits. In <strong>the</strong> firstcase, one firm 13 elected to <strong>in</strong>stall a new securitytechnology before <strong>the</strong> government-mandated adoptionof <strong>the</strong> technology. Although this required an <strong>in</strong>itialoutlay for <strong>the</strong> technology, <strong>the</strong> firm believes thiswill ultimately result <strong>in</strong> lower costs s<strong>in</strong>ce <strong>the</strong>y wereable to design <strong>the</strong> system around <strong>the</strong>ir own processesand systems. Specifically, <strong>the</strong> firm built o<strong>the</strong>rprocess<strong>in</strong>g systems <strong>in</strong>to <strong>the</strong> technology that avoidedadd<strong>in</strong>g ano<strong>the</strong>r step <strong>in</strong> <strong>the</strong>ir process, streaml<strong>in</strong><strong>in</strong>g<strong>the</strong> operations and <strong>the</strong>refore reduc<strong>in</strong>g <strong>the</strong>ir cycletime and operat<strong>in</strong>g costs. Had <strong>the</strong> company waited,it is unlikely that <strong>the</strong> government would have beenso open to design<strong>in</strong>g o<strong>the</strong>r features <strong>in</strong>to <strong>the</strong> system,so <strong>the</strong> firm would have been forced to adopt a systemthat did not “fit” with <strong>the</strong>ir operat<strong>in</strong>g system.The second example illustrates how one firm <strong>in</strong><strong>the</strong> medical supply <strong>in</strong>dustry used an early warn<strong>in</strong>g<strong>in</strong>formation systems to provide data about specificcustomer needs dur<strong>in</strong>g a disruption. Their analysis<strong>in</strong>dicated that <strong>the</strong> firm actually had 48 hours torespond to a disruption before it impacted <strong>the</strong> customer,allow<strong>in</strong>g <strong>the</strong> firm to plan for less expensivetwo-day service ra<strong>the</strong>r than <strong>the</strong> more costly next-dayservice <strong>in</strong> respond<strong>in</strong>g to <strong>the</strong> disruption. 14In both cases, firms proactively <strong>in</strong>vested <strong>in</strong> technologyand systems <strong>in</strong>tended to improve security andat <strong>the</strong> same time enabl<strong>in</strong>g <strong>the</strong> firms to create additionalbenefits of great value.<strong>Collateral</strong> <strong>Benefits</strong> from TQMInvestmentsThe underp<strong>in</strong>n<strong>in</strong>gs of <strong>the</strong> “total quality management”(TQM) approach to security improvements havepotential collateral benefits <strong>in</strong> a number of significantareas. The hallmarks of TQM are dedicationof <strong>the</strong> entire organization and its suppliers (and <strong>in</strong>some cases its customers) to improved security,emphasis on prevention of security breaches, assurancethat <strong>the</strong> security system is operat<strong>in</strong>g “<strong>in</strong> control”with<strong>in</strong> a def<strong>in</strong>ed set of parameters, and <strong>the</strong> embedd<strong>in</strong>gof security <strong>in</strong> <strong>the</strong> firm’s bus<strong>in</strong>ess processes.Operat<strong>in</strong>g “<strong>in</strong> control” when us<strong>in</strong>g a TQM approachto embed and document security <strong>in</strong> <strong>the</strong> logisticsprocesses can lead to a reduction <strong>in</strong> safety stock,lead-time variance, and reduced OS&D shipments. 15Because <strong>the</strong> process is operat<strong>in</strong>g with<strong>in</strong> def<strong>in</strong>ed limitsand with emphasis on <strong>in</strong>ternal discipl<strong>in</strong>e, shipmentsshould be more accurate and can be countedon with greater reliability to precisely meet shipp<strong>in</strong>gspecifications. Information provided to logisticsmanagers with<strong>in</strong> <strong>the</strong> firm should also be counted onto provide accurate representations of <strong>the</strong> goods thatare <strong>in</strong> transit. These same capabilities provide usefulbenefits to non-security areas, such as reduced variation<strong>in</strong> operations, which results <strong>in</strong> lower operat<strong>in</strong>gcosts, and higher levels of employee awareness. Andbetter decisions, likely higher resource utilization,and higher levels of service may be possible throughprocess improvements that aware and enlightenedemployees may <strong>in</strong>itiate and implement.O<strong>the</strong>r capabilities and potential for improvementcan be derived by us<strong>in</strong>g <strong>the</strong> enhanced <strong>in</strong>formationga<strong>in</strong>ed from <strong>the</strong> TQM process. This rigorously collecteddata may offer greater visibility with<strong>in</strong> <strong>the</strong>supply cha<strong>in</strong>, enabl<strong>in</strong>g improved materials track<strong>in</strong>gand early problem identification by discern<strong>in</strong>g bottlenecksand congestion.14IBM Center for The Bus<strong>in</strong>ess of Government


INVESTING IN SUPPLY CHAIN SECURITY<strong>Collateral</strong> <strong>Benefits</strong> from Voluntary<strong>Security</strong> ComplianceWhile <strong>the</strong> U.S. moved ahead first with <strong>in</strong>itiatives toupgrade trade and transportation security, o<strong>the</strong>r countriesas well have passed new legislation or undertakennew <strong>in</strong>itiatives. Most of <strong>the</strong> <strong>in</strong>itiatives <strong>in</strong>volveapproaches similar to those undertaken <strong>in</strong> <strong>the</strong> U.S.They are based primarily on voluntary efforts by companiesto improve supply cha<strong>in</strong> security and <strong>in</strong>cludea benefit <strong>in</strong> terms of facilitated customs process<strong>in</strong>gfor participat<strong>in</strong>g companies. Canada’s Partners <strong>in</strong>Protection, Sweden’s StairSec, and <strong>the</strong> EuropeanUnion’s Authorized Economic Operator program conta<strong>in</strong><strong>the</strong> central <strong>the</strong>mes of voluntary actions to improvesupply cha<strong>in</strong> security and a benefit of facilitated customsprocess<strong>in</strong>g <strong>in</strong> exchange for <strong>the</strong> security improvements.The World Customs Organization is mov<strong>in</strong>gtoward an <strong>in</strong>ternational framework for supply cha<strong>in</strong>security and customs process<strong>in</strong>g. It adopted <strong>the</strong>Resolution on Global <strong>Security</strong> and FacilitationMeasures Concern<strong>in</strong>g <strong>the</strong> International Trade <strong>Supply</strong>Cha<strong>in</strong>, which aims to create an <strong>in</strong>ternational systemfor identify<strong>in</strong>g bus<strong>in</strong>esses that offer a high degree ofsecurity <strong>in</strong> <strong>the</strong>ir supply cha<strong>in</strong> operations and to providecustoms facilitation for those companies.<strong>Security</strong>Investment Direct <strong>Benefits</strong> <strong>Collateral</strong> <strong>Benefits</strong>ProactiveTechnologyInvestments• Technology provides<strong>in</strong>creased ability to track,monitor, and observe materialflows, prevent<strong>in</strong>g excursions• Ability to customize <strong>the</strong> application to <strong>the</strong> benefit of <strong>the</strong> firm• Increase process efficiency through technology• Visibility <strong>in</strong>vestments give real-time awareness of supplycha<strong>in</strong> delays, location, and statusTQMInvestmentsVoluntary<strong>Security</strong>Compliance• More consistent security procedureexecution• Application of Six Sigmamay lead to discipl<strong>in</strong>ed lossreduction efforts• Lower losses• Higher-performance employeesemphasize security• Process design standardizessecurity processes• Design supply cha<strong>in</strong> withfewer handoffs, keep<strong>in</strong>gproduct mov<strong>in</strong>g• European Union’s AuthorizedEconomic Operator programensures base level of supplycha<strong>in</strong> security assessment• Customs specialists work<strong>in</strong>g <strong>in</strong>specialized security programsmay observe risk of securitybreach before breach can occur• Customs-Trade PartnershipAga<strong>in</strong>st Terrorism (C-TPAT)membership provides membercompanies with <strong>in</strong>formationabout <strong>in</strong>dustry “best practices”<strong>in</strong> supply cha<strong>in</strong> security• Sweden’s StairSec programleads to higher <strong>in</strong>spectionrates of uncertified cargo,<strong>in</strong>creas<strong>in</strong>g likelihood of earlywarn<strong>in</strong>g and prevention• Discipl<strong>in</strong>e <strong>in</strong>creases, enabl<strong>in</strong>g compliance (quality,safety, process)• Reduction <strong>in</strong> safety stock, lead-time variance, and lowerOS&D• Better process knowledge and management from additionaldata, greater visibility to discern bottlenecks andcongestion• Safety stock reduction as a result of advance lead-time<strong>in</strong>formation• Investment <strong>in</strong> quality processes results <strong>in</strong> quality security• Consistent process operation leads to fewer disruptions,faster and more reliable operation• Process discipl<strong>in</strong>e leads to higher levels of performance,efficiency• Establish a “mandatory” fundamental standard across<strong>in</strong>dustry for supply cha<strong>in</strong> security via a “voluntary”program• A platform for collaboration and alignment with<strong>in</strong> an<strong>in</strong>dustry that leads to <strong>in</strong>dustry standards, rais<strong>in</strong>g overalllevel of performance <strong>in</strong> quality, service, and cost• C-TPAT supply cha<strong>in</strong> specialist assists firm as CBPliaison for validation, security issues, procedural updates,communication, and tra<strong>in</strong><strong>in</strong>g• Faster border throughput times from fewer <strong>in</strong>spectionsand “green lane” flow, which may raise service levels,enabl<strong>in</strong>g lower work<strong>in</strong>g capital• Process discipl<strong>in</strong>e enables compliance (quality, safety,process), higher levels of process performancewww.bus<strong>in</strong>essofgovernment.org 15


INVESTING IN SUPPLY CHAIN SECURITYWhile it is officially a voluntary security program,<strong>the</strong> U.S. Customs-Trade Partnership Aga<strong>in</strong>st Terrorism(C-TPAT) program for all <strong>in</strong>tents and purposes is nearlya “mandatory” program. 16 The disadvantages forthose firms that do not volunteer are significant—e.g., higher rates of <strong>in</strong>spection that may add extratime of up to 10 to 12 days <strong>in</strong> a congested U.S. seaportand uncerta<strong>in</strong>ty <strong>in</strong> customs process<strong>in</strong>g. For thosefirms that elect to participate <strong>in</strong> C-TPAT, <strong>the</strong>re is aclear program compliance requirement. Regardlessof <strong>the</strong> firm’s <strong>in</strong>tent <strong>in</strong> participat<strong>in</strong>g <strong>in</strong> C-TPAT, onecollateral benefit of this implicit regulation is thatC-TPAT effectively serves as <strong>the</strong> foundation processfor implement<strong>in</strong>g supply cha<strong>in</strong> security for manyfirms, which is a significant benefit.Recent results from those firms participat<strong>in</strong>g<strong>in</strong> C-TPAT report that <strong>the</strong>re are <strong>in</strong>deed tangiblebenefits available. U.S. Customs and BorderProtection (CBP) reports that firms participat<strong>in</strong>g<strong>in</strong> C-TPAT have received tangible benefits <strong>in</strong> termsof reduced customs exam<strong>in</strong>ations. They reportthat “<strong>in</strong> <strong>the</strong> Automated Commercial System (ACS),C-TPAT certified importers received reducedselection rate for compliance measurement exam<strong>in</strong>ation(-3x <strong>in</strong> FY 2003) and exclusion from certa<strong>in</strong>trade-related local and national criteria,” andthat C-TPAT certified importers receive target<strong>in</strong>gbenefits (-7x <strong>in</strong> FY 2003) by receiv<strong>in</strong>g a “credit”via <strong>the</strong> CBP target<strong>in</strong>g system. 17Faster Flow Through CustomsParticipat<strong>in</strong>g <strong>in</strong> <strong>the</strong> various government/<strong>in</strong>dustryprograms that are becom<strong>in</strong>g more prevalentthroughout <strong>the</strong> world provides access to a “greenlane” for imports, which would entail expeditedcustoms clearance, effectively speed<strong>in</strong>g materialflows through <strong>the</strong> import supply cha<strong>in</strong> process. 18Faster throughput times at border cross<strong>in</strong>gs alsocome from fewer <strong>in</strong>spections by virtue of be<strong>in</strong>g <strong>in</strong>compliance with government regulations. The fasterthroughput may raise service levels and lead too<strong>the</strong>r benefits, not <strong>the</strong> least of which <strong>in</strong>clude fasterdelivery to customers, lower work<strong>in</strong>g capital for<strong>in</strong>ventory, and lower operat<strong>in</strong>g costs from less handl<strong>in</strong>gand fewer movements.For some firms, this is <strong>the</strong> most important collateralbenefit: “The overarch<strong>in</strong>g elements that def<strong>in</strong>e <strong>the</strong>[company] have to do with speed and flexibility. Thesecond [that not be<strong>in</strong>g C-TPAT certified] was viewedas an impediment to speed, it became a high priority.If this th<strong>in</strong>g didn’t <strong>in</strong>tersect with speed and flexibility,it would be a ‘who cares?’ But because it could conceivablyplay havoc with speed and flexibility, itbecame a high priority. The fact that it was a potentialimpediment was quickly obvious <strong>in</strong>ternally.” 19Ano<strong>the</strong>r firm placed a conservative cost-sav<strong>in</strong>gs figureon <strong>the</strong>ir C-TPAT compliance, say<strong>in</strong>g that it willsave $12 million <strong>in</strong> cost by reduc<strong>in</strong>g <strong>the</strong> actual costof <strong>the</strong> <strong>in</strong>spection. 20 This figure did not <strong>in</strong>clude anyo<strong>the</strong>r likely benefits such as capital/<strong>in</strong>ventory, coord<strong>in</strong>ation,or service-related cost reductions, mean<strong>in</strong>gthat a more realistic assessment would put <strong>the</strong> actualf<strong>in</strong>ancial impact for <strong>the</strong> firm at multiples of <strong>the</strong>irestimate.Potentially Faster Restart and Flow ThroughCustoms Post DisruptionA widely anticipated but not yet promised ordef<strong>in</strong>ed benefit of participat<strong>in</strong>g <strong>in</strong> government securityprograms is favorable treatment after future disruptions.Although customs officials have made nocommitments to provide this benefit, it seems logicalthat <strong>the</strong>y will select “known shippers” and o<strong>the</strong>rfirms participat<strong>in</strong>g <strong>in</strong> government programs among<strong>the</strong> first cargo to be permitted through customs aftera disruption.Platform for CollaborationThese programs provide a platform for collaborationand alignment with<strong>in</strong> an <strong>in</strong>dustry that leads to <strong>in</strong>dustrystandards, rais<strong>in</strong>g overall level of performance <strong>in</strong><strong>in</strong>dustry on several levels, not just security. Specifically,<strong>the</strong>se programs provide a network of firms that enableshigher levels of coord<strong>in</strong>ation for tackl<strong>in</strong>g common<strong>in</strong>dustry problems. At one firm, <strong>the</strong> “collateral benefitof [<strong>the</strong>] security program has been open communicationwith competitors such as Wal-Mart. It’s <strong>the</strong><strong>in</strong>dustry’s best <strong>in</strong>terest to share <strong>in</strong>formation to helpprotect.” 21<strong>Supply</strong> Cha<strong>in</strong> EfficiencyA number of voluntary programs entail several commonpractices that may help to improve supply cha<strong>in</strong>efficiency as <strong>the</strong>y improve security. Practices such asearly warn<strong>in</strong>g systems—for example, electronic prenotificationof delays or problems <strong>in</strong> customs clearance—enable<strong>the</strong> affected parties to react quickerand with more reaction time. This ultimately makesfor a more thoughtful response that will tend to be16IBM Center for The Bus<strong>in</strong>ess of Government


INVESTING IN SUPPLY CHAIN SECURITYmore effective and will utilize resources better. Asan example, one medical products producer notedthat its early warn<strong>in</strong>g systems give it 12 to 24 hoursto respond before problems impact customers,enabl<strong>in</strong>g <strong>the</strong>m to use <strong>the</strong> precious time for optimalresponse plann<strong>in</strong>g and execution. As it turns out,this foreknowledge allowed <strong>the</strong> firm to reduce emergencytransportation costs and more effectively allocatereserve <strong>in</strong>ventory. With some forethought, firmswill be able to anticipate efficiency and effectivenessimprovements <strong>in</strong> <strong>the</strong>ir supply cha<strong>in</strong> operations.Broader Impact on <strong>the</strong> FirmParticipat<strong>in</strong>g <strong>in</strong> voluntary programs also <strong>in</strong>tegratessecurity <strong>in</strong>to standard processes, engra<strong>in</strong><strong>in</strong>g security<strong>in</strong>to <strong>the</strong> process fabric of <strong>the</strong> firm. This becomes animportant element <strong>in</strong> creat<strong>in</strong>g a security culture that<strong>in</strong>creases <strong>the</strong> level of awareness and sensitivity <strong>in</strong><strong>the</strong> firm to potential security breaches and systemdisruptions.O<strong>the</strong>rs have noted that C-TPAT partners have enjoyedadditional collateral benefits, <strong>in</strong>clud<strong>in</strong>g lower <strong>the</strong>ftand losses, as well as reduced <strong>in</strong>surance rates afterfirms adopt improved security procedures. 22Many of <strong>the</strong> programs serve to <strong>in</strong>still process discipl<strong>in</strong>e<strong>in</strong> <strong>the</strong> firm, which <strong>in</strong>creases compliance andhigher performance <strong>in</strong> o<strong>the</strong>r doma<strong>in</strong>s such as quality,safety, and process performance. As an example,The Gillette Company learned that multiple methodswere be<strong>in</strong>g used <strong>in</strong> <strong>the</strong> firm to handle imports, mak<strong>in</strong>gfor <strong>in</strong>efficiencies and additional costs to handle<strong>the</strong> multiple methods. 23“While prepar<strong>in</strong>g its C-TPAT application, for example,The Gillette Company discovered that each ofits subsidiaries had different ways of handl<strong>in</strong>g imports,said Global Customs Compliance Manager NormanLubeck. He’s now work<strong>in</strong>g on standardiz<strong>in</strong>g importprocedures company-wide, which will br<strong>in</strong>g bothcost and efficiency benefits.” 24www.bus<strong>in</strong>essofgovernment.org 17


INVESTING IN SUPPLY CHAIN SECURITYAchiev<strong>in</strong>g <strong>Collateral</strong> <strong>Benefits</strong>Connect<strong>in</strong>g <strong>Security</strong> Investmentsand <strong>Collateral</strong> <strong>Benefits</strong>Recogniz<strong>in</strong>g <strong>the</strong> potential to augment <strong>the</strong> return onsupply cha<strong>in</strong> security <strong>in</strong>vestments, firms may wish toactively pursue creat<strong>in</strong>g collateral benefits. Yet <strong>the</strong>sebenefits are not guaranteed because <strong>the</strong> <strong>in</strong>vestments<strong>the</strong>mselves do not automatically create collateralbenefits. Instead, <strong>the</strong> security <strong>in</strong>vestments create <strong>the</strong>opportunity—ei<strong>the</strong>r through a new capability, a newprocess, or a different bus<strong>in</strong>ess condition—whichcould <strong>the</strong>n be used to create a collateral benefit. Tofully understand how to create <strong>the</strong> collateral benefitfrom <strong>the</strong> security <strong>in</strong>vestment, one must analyze anddetail <strong>the</strong> causal relationship between <strong>the</strong> security<strong>in</strong>vestment and <strong>the</strong> actual benefit. This is a criticalelement when develop<strong>in</strong>g a realistic bus<strong>in</strong>ess casefor <strong>the</strong> security <strong>in</strong>vestment.While we have suggested and even enumerated abroad range of collateral benefits that could potentiallybe derived from a variety of security <strong>in</strong>vestments,most of <strong>the</strong>se possibilities are based on prelim<strong>in</strong>arydata 25 and early <strong>in</strong>sights ra<strong>the</strong>r than formal datacollection and analysis. The good news is that suchspeculation can be made with some foundationbecause one can f<strong>in</strong>d guidance from similar past<strong>in</strong>vestments. Many of <strong>the</strong> potential <strong>in</strong>vestments predictablycreate certa<strong>in</strong> capabilities, some of whichhave known impacts on supply cha<strong>in</strong>s, enabl<strong>in</strong>g oneto develop a l<strong>in</strong>kage map from <strong>the</strong> <strong>in</strong>vestment tobenefits. A l<strong>in</strong>kage map may illustrate <strong>the</strong> relationshipbetween a security <strong>in</strong>vestment and <strong>the</strong> subsequentcapability that is created, which <strong>in</strong> turn enables subsequentaction and potential benefit. An examplemay help illustrate <strong>the</strong> possibility.Mak<strong>in</strong>g <strong>the</strong> Connection: <strong>Collateral</strong><strong>Benefits</strong> L<strong>in</strong>kage MapsFor example, <strong>in</strong>vest<strong>in</strong>g <strong>in</strong> track<strong>in</strong>g systems to provideasset visibility may provide a valuable securityservice/role, but it is also believed to reduceuncerta<strong>in</strong>ty <strong>in</strong> <strong>the</strong> supply cha<strong>in</strong> with real-timeconfirmed asset location and status/condition. Withsuch <strong>in</strong>formation, supply cha<strong>in</strong> managers have lessuncerta<strong>in</strong>ty and could <strong>the</strong>refore reduce <strong>the</strong> amountof safety stock necessary. If <strong>the</strong> manager doesreduce <strong>the</strong> safety stock, this will reduce work<strong>in</strong>gcapital and operat<strong>in</strong>g cost (lower levels of <strong>in</strong>ventoryto f<strong>in</strong>ance, fewer movements to make). Withlower levels of <strong>in</strong>ventory, <strong>the</strong> firm needs less spacefor that <strong>in</strong>ventory, reduc<strong>in</strong>g <strong>the</strong> amount of stock<strong>in</strong>gspace required (elim<strong>in</strong>at<strong>in</strong>g <strong>in</strong>terim stock po<strong>in</strong>tsor reduc<strong>in</strong>g contracted space commitments). If <strong>the</strong>firm elim<strong>in</strong>ates <strong>in</strong>terim stock po<strong>in</strong>ts, <strong>the</strong>y will enjoylower operat<strong>in</strong>g costs (fewer stock po<strong>in</strong>ts and lesshandl<strong>in</strong>g from fewer movements) and potentiallyfaster cycle times (fewer stops, less time handl<strong>in</strong>g/stock<strong>in</strong>g/shipp<strong>in</strong>g).This example, illustrated <strong>in</strong> Figure 1, shows <strong>the</strong>potential for creat<strong>in</strong>g collateral benefits by identify<strong>in</strong>g<strong>the</strong> l<strong>in</strong>kages between <strong>the</strong> <strong>in</strong>vestment and<strong>the</strong> benefit. Captur<strong>in</strong>g and achiev<strong>in</strong>g <strong>the</strong> benefits,however, requires that <strong>the</strong> firm take action (<strong>in</strong> <strong>the</strong>example given, reduc<strong>in</strong>g <strong>in</strong>ventory and elim<strong>in</strong>at<strong>in</strong>gstock po<strong>in</strong>ts). Additionally, <strong>in</strong> some cases <strong>the</strong>collateral benefits can also be attributed to o<strong>the</strong>rconditions as well, so <strong>the</strong>re may be o<strong>the</strong>r requirementsthat need to be present <strong>in</strong> order to capture<strong>the</strong> benefits.18IBM Center for The Bus<strong>in</strong>ess of Government


INVESTING IN SUPPLY CHAIN SECURITYFigure 1: Example of a <strong>Collateral</strong> <strong>Benefits</strong> L<strong>in</strong>kage MapLocationand StatusExceptionsEvidentReal-TimeCorrectionTheft andInterruptionPreventedAssetVisibilityLocation,StatusKnownReal TimeLowerUncerta<strong>in</strong>tyLessSafetyStockRequiredLowerWork<strong>in</strong>gCapitalOperat<strong>in</strong>gCostsLowerWork<strong>in</strong>gCapitalOperat<strong>in</strong>gCostsLessSpaceRequiredReduceStockPo<strong>in</strong>tsShorterCycleTimesAga<strong>in</strong>, this <strong>in</strong>tends to show that <strong>the</strong>se collateralbenefits are possible. The order of magnitude isdependent on <strong>the</strong> scope and <strong>the</strong> success of <strong>the</strong>implementation, and clearly <strong>the</strong> firm would needto take action <strong>in</strong> order to enjoy <strong>the</strong> ga<strong>in</strong>s. As suggestedearlier, <strong>the</strong> ability of <strong>the</strong> firm to enjoy <strong>the</strong>collateral benefits is also dependent on o<strong>the</strong>r conditionsas well. This <strong>in</strong>cludes whe<strong>the</strong>r <strong>the</strong> firm actuallytakes action to reduce <strong>in</strong>ventory levels, to use <strong>the</strong>additional <strong>in</strong>formation <strong>in</strong> its plann<strong>in</strong>g, and even toelim<strong>in</strong>ate <strong>in</strong>termediaries. So we can assert that <strong>the</strong><strong>in</strong>vestments can create possibilities, but enjoy<strong>in</strong>g <strong>the</strong>advantage requires o<strong>the</strong>r conditions as well; it’s notautomatic, and <strong>the</strong>refore creat<strong>in</strong>g and leverag<strong>in</strong>g <strong>the</strong>collateral benefits will take management attentionand action.Challenges and Choices for Creat<strong>in</strong>g<strong>Collateral</strong> <strong>Benefits</strong>M<strong>in</strong>imalist or Holistic Systems Approach?An <strong>in</strong>itial observation from <strong>in</strong>terviews with securityleaders <strong>in</strong>dicates that firms are tak<strong>in</strong>g one of threeapproaches to implement supply cha<strong>in</strong> security:do<strong>in</strong>g noth<strong>in</strong>g, mak<strong>in</strong>g m<strong>in</strong>imal efforts targetedat satisfy<strong>in</strong>g voluntary program compliance obligations,or mak<strong>in</strong>g holistic efforts targeted at improv<strong>in</strong>g<strong>the</strong> overall system.The “do noth<strong>in</strong>g” group has chosen to make no <strong>in</strong>vestment<strong>in</strong> supply cha<strong>in</strong> security. These firms appear tobe fatalists and presume that a terrorist attack or disruptionwill affect all companies equally. Based onthat, <strong>the</strong>y have chosen to take no action at all andwill not receive <strong>the</strong> benefits associated with security<strong>in</strong>vestments.Slightly more <strong>in</strong>volved are those firms that take a“m<strong>in</strong>imalist” approach. Here, <strong>the</strong> firms undertake<strong>the</strong> bare m<strong>in</strong>imum required to satisfy participationrequirements for voluntary government programs.As an example, one high-tech company sell<strong>in</strong>gconsumer products stated that <strong>the</strong>ir supply cha<strong>in</strong>security approach depends completely on comply<strong>in</strong>gwith a government security program: “We’repursu<strong>in</strong>g C-TPAT certification, and that’s our securityplan.” 26 In <strong>the</strong>se cases, <strong>the</strong> firms will likely enjoylower security operat<strong>in</strong>g costs and may receivelimited collateral benefits from <strong>the</strong>ir security <strong>in</strong>vest-www.bus<strong>in</strong>essofgovernment.org 19


INVESTING IN SUPPLY CHAIN SECURITYments, but may be vulnerable to security breachor o<strong>the</strong>r disruptions and may also suffer higherlosses and delays <strong>in</strong> <strong>the</strong>ir respective supply cha<strong>in</strong>s.In comparison to <strong>the</strong>se two groups, firms adopt<strong>in</strong>ga holistic approach undertake a comprehensiveeffort to impact <strong>the</strong> entire system (i.e., <strong>the</strong> end-to-endsupply cha<strong>in</strong>) ra<strong>the</strong>r than just meet<strong>in</strong>g voluntaryprogram compliance obligations. This group is mostlikely to realize collateral benefits from <strong>the</strong>ir security<strong>in</strong>vestments. One firm pursu<strong>in</strong>g a holistic systemsapproach <strong>in</strong>vested significant sums above andbeyond that which was needed for C-TPAT complianceto improve <strong>the</strong> security of <strong>the</strong>ir supply cha<strong>in</strong>,and <strong>the</strong> firm enjoyed several benefits. In additionto elim<strong>in</strong>at<strong>in</strong>g losses on new product <strong>in</strong>troductions,<strong>the</strong> firm enjoyed <strong>the</strong> collateral benefits of new levelsof collaboration <strong>in</strong> <strong>the</strong>ir <strong>in</strong>dustry, and <strong>the</strong>ir C-TPATapplication required no additional efforts to ga<strong>in</strong>compliance. Ultimately, this firm, <strong>in</strong> adopt<strong>in</strong>g <strong>the</strong>more holistic approach, has created a more securesupply cha<strong>in</strong>, with lower loss levels, and improved<strong>the</strong>ir overall end-to-end supply cha<strong>in</strong> efficiency andperformance, with <strong>the</strong>se benefits far exceed<strong>in</strong>g <strong>the</strong><strong>in</strong>vestment costs.Mak<strong>in</strong>g Investment ChoicesFirms have supply cha<strong>in</strong> security <strong>in</strong>vestmentchoices, and <strong>the</strong> best option for one firm may notbe <strong>the</strong> best option for ano<strong>the</strong>r firm. The specificbenefits, costs, risks, and requirements need to beassessed by <strong>the</strong> firm <strong>in</strong> order to make a determ<strong>in</strong>ationas to what is best for <strong>the</strong> firm itself.Prior to mak<strong>in</strong>g <strong>in</strong>vestment decisions, it may be possibleand useful to consider several characteristicsof <strong>the</strong> various security <strong>in</strong>vestments that can possiblycreate collateral benefits:• Effort required to implement <strong>the</strong> security <strong>in</strong>itiative• Collaboration required to achieve <strong>the</strong> collateralbenefits• Cost of implement<strong>in</strong>g and additional effortsrequired to create <strong>the</strong> collateral benefits• Estimated time for collateral benefits, i.e.,whe<strong>the</strong>r <strong>the</strong> collateral benefit could be enjoyed<strong>in</strong> <strong>the</strong> near term or long termThese may provide a start<strong>in</strong>g po<strong>in</strong>t for firms to consider<strong>the</strong> possibilities.20IBM Center for The Bus<strong>in</strong>ess of Government


INVESTING IN SUPPLY CHAIN SECURITYConclusionObservations and Issues to ConsiderWhile this report has <strong>in</strong>troduced several new conceptsand proposed some new management andpolicy actions, a number of o<strong>the</strong>r directly relevantand tangential issues are worthy of some discussion.Some of <strong>the</strong>se are offered here, as it may be usefulfor organizations to consider <strong>the</strong>se prelim<strong>in</strong>ary observationswhen plann<strong>in</strong>g <strong>the</strong>ir <strong>in</strong>vestment decisions.Most notably, <strong>the</strong> prelim<strong>in</strong>ary analysis shows that<strong>the</strong> major collateral benefits accrue from reduc<strong>in</strong>gactual security breaches and enabl<strong>in</strong>g trade cont<strong>in</strong>uityor “trade security.” Some firms place <strong>the</strong> value ofthis as high as US$50–100 million/day cost, and <strong>in</strong>one actual case, one firm’s “trade security” enabledit to avoid <strong>the</strong> US$250 million loss that its lesssecure competitor suffered.It also appears that <strong>the</strong>re is some “first mover advantage”possible to firms if <strong>the</strong>y engage early enough<strong>in</strong> <strong>the</strong> process. One firm described how it was ableto establish an important security standard by volunteer<strong>in</strong>gto <strong>in</strong>stall security equipment as a betasite for <strong>the</strong> local government, <strong>the</strong>refore build<strong>in</strong>g <strong>the</strong>standard around its own <strong>in</strong>ternal processes, whichsubsequently made for a faster throughput andlower operat<strong>in</strong>g cost for <strong>the</strong> firm.Some forward-th<strong>in</strong>k<strong>in</strong>g security efforts have engaged<strong>the</strong> corporate account<strong>in</strong>g or f<strong>in</strong>ance operations, <strong>in</strong>one case <strong>in</strong>stall<strong>in</strong>g a security chief who also wasa CPA. Their experience <strong>in</strong>dicated that this officerenjoyed <strong>in</strong>creased success of mak<strong>in</strong>g security <strong>in</strong>vestmentsand creat<strong>in</strong>g collateral benefits by virtue ofknow<strong>in</strong>g how to quantify benefits and credibly articulatethis <strong>in</strong>to <strong>the</strong> management hierarchy.A significant collateral benefit may come when <strong>the</strong>firm ties <strong>the</strong> role of security to corporate objectives(i.e., security plays an <strong>in</strong>tegral role <strong>in</strong> <strong>the</strong> deliveryof <strong>the</strong> product or service to <strong>the</strong> customer) ra<strong>the</strong>rthan treat<strong>in</strong>g it merely as a separate activity. Onefirm <strong>in</strong> <strong>the</strong> fashion <strong>in</strong>dustry found it less expensiveto spend US$500,000 on security by hir<strong>in</strong>g personnelto be on site (this added about US$.01 perUS$200 item); <strong>the</strong> on-site resource established arobust security program, mak<strong>in</strong>g <strong>the</strong>ir upstream supplycha<strong>in</strong> more secure and thoroughly prepar<strong>in</strong>g<strong>the</strong>m for <strong>the</strong> subsequent C-TPAT application. For thisfashion product provider, time to market was critical,and so a key motivation for mak<strong>in</strong>g <strong>the</strong> security<strong>in</strong>vestment was <strong>the</strong> speed advantage offered bybe<strong>in</strong>g C-TPAT certified.F<strong>in</strong>ally, <strong>the</strong> importance and impact of voluntaryprograms is likely to <strong>in</strong>crease as customs clearanceprocesses require greater oversight and time. It iswidely recognized that <strong>the</strong>re is a capacity constra<strong>in</strong>t<strong>in</strong> mov<strong>in</strong>g materials through many ports throughout<strong>the</strong> world. And with processes requir<strong>in</strong>g more oversight,one can predict that <strong>the</strong>re will be <strong>in</strong>creas<strong>in</strong>gdelays for border cross<strong>in</strong>gs—delays that entail animplicit cost (cost of delay, cost of additional <strong>in</strong>spection)and will <strong>in</strong>crease. Hence, <strong>the</strong> value of hav<strong>in</strong>gsecurity certification under a voluntary government/<strong>in</strong>dustry program will likely <strong>in</strong>crease.The Challenge and OpportunityThis report presents an <strong>in</strong>formed po<strong>in</strong>t of view oncollateral benefits available to those mak<strong>in</strong>g security<strong>in</strong>vestments. The work is based on <strong>in</strong>sight, experience,secondary data, and anecdotal primary data,provid<strong>in</strong>g a qualitative assessment that portrayswww.bus<strong>in</strong>essofgovernment.org 21


INVESTING IN SUPPLY CHAIN SECURITY<strong>the</strong> landscape relevant to develop<strong>in</strong>g and captur<strong>in</strong>gcollateral benefits from supply cha<strong>in</strong> security<strong>in</strong>vestments. Far from be<strong>in</strong>g a foregone conclusion,though, captur<strong>in</strong>g collateral benefits will require<strong>the</strong> important next step of validat<strong>in</strong>g <strong>the</strong>se observationsand fur<strong>the</strong>r document<strong>in</strong>g <strong>the</strong> actual dynamicsassociated with identify<strong>in</strong>g and achiev<strong>in</strong>g collateralbenefits from supply cha<strong>in</strong> security <strong>in</strong>vestments.Creat<strong>in</strong>g and achiev<strong>in</strong>g collateral benefits requiresa number of o<strong>the</strong>r capabilities and conditions <strong>in</strong>order to capture <strong>the</strong> benefits. Often, <strong>the</strong> collateralbenefit enables a capability that must <strong>the</strong>n be fur<strong>the</strong>rdeveloped and applied. Even for those <strong>in</strong>stanceswhere <strong>the</strong>re is a direct causal relationship betweena security <strong>in</strong>vestment and a capability, firms stillneed to take <strong>the</strong> <strong>in</strong>itiative to exploit <strong>the</strong> potential.Interest<strong>in</strong>gly, <strong>the</strong> potential will vary somewhat byfirm, depend<strong>in</strong>g on firm characteristics and competitivesituation, among o<strong>the</strong>r factors.From <strong>the</strong> perspective of <strong>the</strong> firms that are consider<strong>in</strong>gsupply cha<strong>in</strong> security <strong>in</strong>vestments, <strong>the</strong> goodnews is that this prelim<strong>in</strong>ary analysis <strong>in</strong>dicates <strong>the</strong>reare many potential collateral benefits that may bederived from <strong>the</strong> <strong>in</strong>vestments. The lack of documentedevidence to make <strong>the</strong> case should not be<strong>in</strong>terpreted as an <strong>in</strong>dication that atta<strong>in</strong><strong>in</strong>g <strong>the</strong> benefitsis impossible; this is more likely a result of <strong>the</strong>relatively recent recognition of security weaknessesand this emerg<strong>in</strong>g opportunity. One should not besurprised that <strong>the</strong>re is a lack of systems to measure<strong>the</strong> impact of <strong>the</strong> security <strong>in</strong>vestment, much less <strong>the</strong>impact of collateral benefits. The management <strong>in</strong>formationsystems need to be ref<strong>in</strong>ed, and <strong>the</strong> organizationalfocus needs to be sensitized to observe andmeasure this data.Those firms choos<strong>in</strong>g to take a deeper look at <strong>the</strong>potential of creat<strong>in</strong>g <strong>the</strong> various collateral benefitswill need to honestly and realistically assess <strong>the</strong>effort level and likelihood of success of <strong>the</strong>ir effortsto create collateral benefits. By virtue of undertak<strong>in</strong>gthis effort, firms will enjoy <strong>the</strong> collateral benefit ofa more <strong>in</strong>timate understand<strong>in</strong>g of <strong>the</strong>ir own operations,processes, capabilities, and weaknesses. Thisenables <strong>the</strong> firm to take even greater advantage of<strong>the</strong> possibility by tailor<strong>in</strong>g <strong>the</strong> efforts to <strong>the</strong>ir firmspecificsituation.If this were easy, of course, all firms would beundertak<strong>in</strong>g <strong>the</strong>se activities, and copious amounts ofdata would be available to guide <strong>the</strong> un<strong>in</strong>itiated. Yet,<strong>the</strong> fact that achiev<strong>in</strong>g collateral benefits rema<strong>in</strong>s achallenge may have a positive twist to it—it clearly<strong>in</strong>dicates <strong>the</strong> potential to create some competitiveadvantage for firms successfully seiz<strong>in</strong>g <strong>the</strong> opportunityand captur<strong>in</strong>g <strong>the</strong>se potentially significant benefits.A key turn<strong>in</strong>g po<strong>in</strong>t will occur when <strong>the</strong> earlyadopters promote <strong>the</strong>ir successes, demonstrat<strong>in</strong>g <strong>the</strong>potential economic value and competitive advantagefrom <strong>the</strong>ir <strong>in</strong>vestments <strong>in</strong> supply cha<strong>in</strong> security.Look<strong>in</strong>g AheadThe <strong>in</strong>ternational trade and transportation systemrema<strong>in</strong>s vulnerable to an attack by terrorists whoseek to strike at <strong>the</strong> heart of <strong>the</strong> underp<strong>in</strong>n<strong>in</strong>gs ofmodern economies. It is widely understood bygovernment leaders and bus<strong>in</strong>ess executives thatprotection of <strong>the</strong> systems of trade and transportationare <strong>the</strong> exclusive prov<strong>in</strong>ce of nei<strong>the</strong>r <strong>the</strong> governmentnor <strong>the</strong> private sector. Nei<strong>the</strong>r has <strong>the</strong> meansto completely supervise <strong>the</strong> vast number of activitiesthat constitute <strong>in</strong>ternational trade. Governments andfirms work<strong>in</strong>g toge<strong>the</strong>r, each operat<strong>in</strong>g with<strong>in</strong> <strong>the</strong>irrealm of effectiveness, can, however, greatly reduce<strong>the</strong> opportunities for attacks by terrorists aga<strong>in</strong>st <strong>the</strong>system of <strong>in</strong>ternational trade.The creation of collateral benefits from <strong>in</strong>vestments<strong>in</strong> security may very well be <strong>the</strong> fulcrum that balances<strong>the</strong> government’s <strong>in</strong>terest <strong>in</strong> <strong>in</strong>creased securitywith <strong>the</strong> private sector’s <strong>in</strong>terest <strong>in</strong> <strong>in</strong>creasedefficiency. Without collateral benefits, <strong>in</strong>creases <strong>in</strong>security will be viewed only as <strong>in</strong>creases <strong>in</strong> costs.The natural reaction of <strong>the</strong> vast majority of firmswhen faced with a requirement that <strong>in</strong>creases <strong>the</strong>ircosts will be to act entirely rationally. They willdevise a strategy to reduce <strong>the</strong> costs and drive <strong>the</strong>mto <strong>the</strong> lowest possible level. Governments thatundertake a purely regulatory approach will f<strong>in</strong>dthat many of <strong>the</strong> transactions that need to be controlledare beyond <strong>the</strong>ir reach, and that <strong>the</strong>y havecreated a regulatory environment of <strong>in</strong>creased costsand very uncerta<strong>in</strong> benefits. The collateral benefitsapproach, however, allows governments to extend<strong>the</strong>ir reach deeply <strong>in</strong>to <strong>the</strong> systems of <strong>in</strong>ternationaltrade and allows firms to respond to <strong>the</strong> need for<strong>in</strong>creased security throughout <strong>the</strong> trade process22IBM Center for The Bus<strong>in</strong>ess of Government


INVESTING IN SUPPLY CHAIN SECURITY<strong>in</strong> a way that enhances <strong>the</strong>ir competitive position.<strong>Collateral</strong> benefits work <strong>in</strong> consonance with freetrade by allow<strong>in</strong>g governments to atta<strong>in</strong> a highersecurity content of <strong>in</strong>ternational trade without regulat<strong>in</strong>g<strong>the</strong> details of <strong>the</strong> components of <strong>the</strong> transaction.At this time, <strong>the</strong> collateral benefits approach conta<strong>in</strong>sa great deal of potential but rema<strong>in</strong>s difficultto quantify. There is little if any analysis of hard datadocument<strong>in</strong>g <strong>the</strong> actual collateral return on <strong>in</strong>vestments<strong>in</strong> security, as very few firms have taken asystematic and discipl<strong>in</strong>ed approach to understand<strong>in</strong>gand creat<strong>in</strong>g collateral benefits. Firms need to beaware of <strong>the</strong> risks <strong>the</strong>y take if <strong>in</strong>vestments are made<strong>in</strong> security with <strong>the</strong> hope that collateral benefits willflow from <strong>the</strong> <strong>in</strong>vestments but without <strong>the</strong> detailedplann<strong>in</strong>g and attention to manag<strong>in</strong>g change that arenecessary to achieve <strong>the</strong> benefits. Just as was <strong>the</strong>case with many firms that pursued TQM withoutfully understand<strong>in</strong>g <strong>the</strong> requirements, <strong>the</strong>re are significantplann<strong>in</strong>g and change management obligationsthat are prerequisites to successfully creat<strong>in</strong>gcollateral benefits.Government regulatory agencies as well need toth<strong>in</strong>k outside <strong>the</strong>ir regulatory focus and understandhow <strong>the</strong>ir decisions impact <strong>the</strong> operational realm of<strong>in</strong>ternational trade. The “green lane” is a term usedby customs organizations to describe how <strong>the</strong> customsformalities of firms certified to be secure willbe processed. A green lane is mean<strong>in</strong>gless, however,if it is an expression of customs process<strong>in</strong>g that isnot <strong>in</strong>tegrated with <strong>the</strong> actual operations of <strong>the</strong> port.At a seaport, chassis need to be available and dedicatedlanes and special process<strong>in</strong>g need to be availableto expedite egress from <strong>the</strong> port. Governmentagencies need to pay close attention to <strong>the</strong> detailedplann<strong>in</strong>g and change management that are <strong>the</strong> foundationsof collateral benefits.<strong>Collateral</strong> benefits are an important componentof <strong>the</strong> “new normalcy” of <strong>in</strong>ternational trade—<strong>the</strong>quest to have it both ways, <strong>in</strong>creas<strong>in</strong>g both securityand efficiency. A great deal of work rema<strong>in</strong>s tobe done to convert <strong>the</strong> opportunity <strong>in</strong>to actuality,with potentially significant benefits and competitiveadvantages available to those supply cha<strong>in</strong>s that aresuccessful.www.bus<strong>in</strong>essofgovernment.org 23


INVESTING IN SUPPLY CHAIN SECURITYAppendix:Overview of <strong>Supply</strong> Cha<strong>in</strong><strong>Security</strong> Investment OptionsTable A.1: Overview of <strong>Supply</strong> Cha<strong>in</strong> <strong>Security</strong> Investment Options—Direct and <strong>Collateral</strong> <strong>Benefits</strong><strong>Security</strong>Investment Direct <strong>Benefits</strong> <strong>Collateral</strong> <strong>Benefits</strong>Asset Visibilityand Track<strong>in</strong>g• Provide positive locationstatus, prevent<strong>in</strong>g excursions• Provide time-def<strong>in</strong>ite andcontrolled cha<strong>in</strong> of custody• Lower <strong>the</strong>ft and losses• Faster recalls• Fewer delayed shipments• Better plann<strong>in</strong>g, enabl<strong>in</strong>g lower work<strong>in</strong>g capital for<strong>in</strong>ventory• Less Overages, Shortages, and Damages (OS&D)• Protection of brand namePersonnel<strong>Security</strong>Physical <strong>Security</strong>StandardsDevelopmentSupplierSelection andInvestment• Thorough background checkelim<strong>in</strong>ates “bad actors” fromhir<strong>in</strong>g pool• Regular background checksprovide early warn<strong>in</strong>g foremployees operat<strong>in</strong>g under<strong>the</strong> <strong>in</strong>fluence• Controlled access keeps outunauthorized personnel• Protection of <strong>in</strong>tellectualproperty• Protection of capital equipmentand personnel• Protection of product <strong>in</strong>tegrity• Facilitate coord<strong>in</strong>ation ofmulti-company security activities(<strong>in</strong>itiatives, st<strong>in</strong>g operations,<strong>in</strong>cident <strong>in</strong>vestigations)• <strong>Security</strong> breaches easier tospot with standard systems• Higher levels of security withcommon procedures• System-level and suppliersecurity improvement• Ensure a secure supply ofmaterials• Early warn<strong>in</strong>g of upstreamsecurity issues• Reduce upstream and<strong>in</strong>bound losses• Customer loyalty, <strong>in</strong>creased sales revenues, highermarket share• Employee commitment and belief <strong>in</strong> company’sconcern for employee• Customer recognition of firm’s safe and secure environmentas an expertise, <strong>in</strong>creas<strong>in</strong>g customer loyalty• Fewer <strong>the</strong>fts and OS&D by virtue of hav<strong>in</strong>g moresecure facility• Reduced equipment damage and operat<strong>in</strong>g costs(lower <strong>in</strong>surance rates)• Fewer safety <strong>in</strong>cidents and catastrophes• Improve <strong>the</strong> efficiency of ship, tra<strong>in</strong>, truck, term<strong>in</strong>aloperations; cuts <strong>in</strong>ternational shipp<strong>in</strong>g times• Platform for collaboration with<strong>in</strong> an <strong>in</strong>dustry lead<strong>in</strong>gto standards that raise level of performance• Process discipl<strong>in</strong>e enables compliance (quality, safety,process), higher performance• Common processes reduce confusion, raise predictability,improve staff backup• Reduce non-security losses• Lower <strong>in</strong>spection costs, faster throughput• Enhanced communication via collaboration• Increase efficiency through jo<strong>in</strong>t plann<strong>in</strong>g• Utilize <strong>in</strong>ternal security resources to assist suppliers,ultimately mak<strong>in</strong>g for improved relationships24IBM Center for The Bus<strong>in</strong>ess of Government


INVESTING IN SUPPLY CHAIN SECURITY<strong>Security</strong>Investment Direct <strong>Benefits</strong> <strong>Collateral</strong> <strong>Benefits</strong>Transportationand Conveyance<strong>Security</strong>• Reduce <strong>the</strong>ft losses• Reduce adulteration of product• Reduce chance of cargovessel misuse (weapondelivery system)• Protect conveyance equipment,vessels• Cost avoidance of non-product-related costs (<strong>in</strong>directcosts)• Crime and vandalism rates fall• Fewer disruptions to <strong>the</strong> supply cha<strong>in</strong>, more cost sav<strong>in</strong>gscompared with avoided losses• Less capital required for <strong>in</strong>ventory• Reduced transportation cycle timeBuild<strong>in</strong>gOrganizationalInfrastructureAwareness andCapabilitiesCollaborationAmong <strong>Supply</strong>Cha<strong>in</strong> PartiesProactiveTechnologyInvestmentsTQMInvestmentsVoluntary<strong>Security</strong>Compliance• Build awareness of securityconcerns• Increase role of security <strong>in</strong>daily operations and everyassignment• Improved coord<strong>in</strong>ationalong supply cha<strong>in</strong> <strong>in</strong>creasessecurity• Technology provides<strong>in</strong>creased ability to track,monitor, and observe materialflows, prevent<strong>in</strong>g excursions• More consistent security procedureexecution• Application of Six Sigmamay lead to discipl<strong>in</strong>ed lossreduction efforts• Lower losses• Higher-performance employeesemphasize security• Process design standardizessecurity processes• Design supply cha<strong>in</strong> withfewer handoffs, keep<strong>in</strong>gproduct mov<strong>in</strong>g• European Union’s AuthorizedEconomic Operator programensures base level of supplycha<strong>in</strong> security assessment• Customs specialists work<strong>in</strong>g <strong>in</strong>specialized security programsmay observe risk of securitybreach before breach can occur• Customs-Trade PartnershipAga<strong>in</strong>st Terrorism (C-TPAT)membership provides membercompanies with <strong>in</strong>formationabout <strong>in</strong>dustry “best practices”<strong>in</strong> supply cha<strong>in</strong> security• Sweden’s StairSec programleads to higher <strong>in</strong>spectionrates of uncertified cargo,<strong>in</strong>creas<strong>in</strong>g likelihood of earlywarn<strong>in</strong>g and prevention• Increase problem prevention through recognition byemployees• Increase early <strong>in</strong>tervention, reduc<strong>in</strong>g impact of adisruption• Improve <strong>the</strong> ability to respond with early awareness• Platform for broader alignment• Enable creation of a secure supply cha<strong>in</strong> network forcommon problem solv<strong>in</strong>g, resource shar<strong>in</strong>g• Improve communication among supply cha<strong>in</strong> partners,potentially reduc<strong>in</strong>g coord<strong>in</strong>ation costs• Ability to customize <strong>the</strong> application to <strong>the</strong> benefit of <strong>the</strong> firm• Increase process efficiency through technology• Visibility <strong>in</strong>vestments give real-time awareness of supplycha<strong>in</strong> delays, location, and status• Discipl<strong>in</strong>e <strong>in</strong>creases, enabl<strong>in</strong>g compliance (quality,safety, process)• Reduction <strong>in</strong> safety stock, lead-time variance, and lowerOS&D• Better process knowledge and management from additionaldata, greater visibility to discern bottlenecks andcongestion• Safety stock reduction as a result of advance lead-time<strong>in</strong>formation• Investment <strong>in</strong> quality processes results <strong>in</strong> quality security• Consistent process operation leads to fewer disruptions,faster and more reliable operation• Process discipl<strong>in</strong>e leads to higher levels of performance,efficiency• Establish a “mandatory” fundamental standard across<strong>in</strong>dustry for supply cha<strong>in</strong> security via a “voluntary”program• A platform for collaboration and alignment with<strong>in</strong> an<strong>in</strong>dustry that leads to <strong>in</strong>dustry standards, rais<strong>in</strong>g overalllevel of performance <strong>in</strong> quality, service, and cost• C-TPAT supply cha<strong>in</strong> specialist assists firm as CBPliaison for validation, security issues, procedural updates,communication, and tra<strong>in</strong><strong>in</strong>g• Faster border throughput times from fewer <strong>in</strong>spectionsand “green lane” flow, which may raise service levels,enabl<strong>in</strong>g lower work<strong>in</strong>g capital• Process discipl<strong>in</strong>e enables compliance (quality, safety,process), higher levels of process performancewww.bus<strong>in</strong>essofgovernment.org 25


INVESTING IN SUPPLY CHAIN SECURITYEndnotes1. A number of terms have been used to describethis capability, <strong>in</strong>clud<strong>in</strong>g resilience, bus<strong>in</strong>ess cont<strong>in</strong>uity,cont<strong>in</strong>gency plann<strong>in</strong>g, and “trade security” (“trade security”refers to a broader set of capabilities described <strong>in</strong> <strong>the</strong>white paper “Trade <strong>Security</strong>: The New Equation for <strong>the</strong>New Normalcy” by <strong>the</strong> authors). One can th<strong>in</strong>k of supplycha<strong>in</strong> security <strong>in</strong> terms of ma<strong>in</strong>ta<strong>in</strong><strong>in</strong>g <strong>the</strong> <strong>in</strong>tegrity of <strong>the</strong>product, processes, and <strong>in</strong>formation, <strong>in</strong> contrast to supplycha<strong>in</strong> cont<strong>in</strong>uity or resilience, which we def<strong>in</strong>e as “<strong>the</strong>ability to react to unexpected disruption and restore normalsupply cha<strong>in</strong> operations.”2. <strong>Supply</strong> cha<strong>in</strong> security <strong>in</strong>vestments range from capitalequipment, human resources, process improvements,and operat<strong>in</strong>g expenses for a range of activities <strong>in</strong>clud<strong>in</strong>gphysical security improvements, monitor<strong>in</strong>g, and <strong>in</strong>cident<strong>in</strong>vestigation.3. This problem has also been recently addressed byresearchers us<strong>in</strong>g system dynamics methods. See “NobodyEver Gets Credit for Fix<strong>in</strong>g Defects that Didn’t Happened:Creat<strong>in</strong>g and Susta<strong>in</strong><strong>in</strong>g Process Improvement,” CaliforniaManagement Review, 43, 4:64–88 by N. Repenn<strong>in</strong>g andJ. Sterman, 2001.4. Early mention of collateral benefits <strong>in</strong>cludes<strong>in</strong>sights from several leaders, <strong>in</strong>clud<strong>in</strong>g Dr. Ruth David,CEO and president of ANSER Analytical Service, whoco<strong>in</strong>ed <strong>the</strong> term “dual benefits.” Additionally, “dual benefitsolutions” are profiled through <strong>the</strong> Homeland <strong>Security</strong>Institute operated by ANSER (http://www.homelandsecurity.org/bullet<strong>in</strong>/current_bullet<strong>in</strong>.cfm).5. “Quality is free” by Phil Crosby. Professor HauLee and Michael Wolfe also recognized and notedsimilarities between security improvement and qualityimprovement <strong>in</strong> <strong>the</strong>ir article “<strong>Supply</strong> Cha<strong>in</strong> <strong>Security</strong>without Tears” published <strong>in</strong> <strong>Supply</strong> Cha<strong>in</strong> ManagementReview, Jan–Feb 2003.6. J. Martha and S. Subbakrishna. (2002), “Target<strong>in</strong>ga just-<strong>in</strong>-case <strong>Supply</strong> Cha<strong>in</strong> for <strong>the</strong> Inevitable NextDisaster,” <strong>Supply</strong> Cha<strong>in</strong> Management Review, September/October, pp. 18–23.7. V<strong>in</strong>od S<strong>in</strong>ghal, “<strong>Supply</strong> Cha<strong>in</strong> Glitches andShareholder Value Destruction,” Bus<strong>in</strong>ess Brief<strong>in</strong>g: GlobalPurchas<strong>in</strong>g and <strong>Supply</strong> Cha<strong>in</strong> Strategies. In this study, <strong>the</strong>researchers exam<strong>in</strong>ed <strong>in</strong>stances where firms experiencedproduction or shipp<strong>in</strong>g delays as announced <strong>in</strong> <strong>the</strong> TheWall Street Journal or <strong>the</strong> Dow Jones News Service.8. Ibid.9. Almar Latour, “Trial by Fire: A Blaze <strong>in</strong>Albuquerque Sets Off Major Crisis For Cell-Phone Giants,”The Wall Street Journal, January 29, 2001, page A1.10. “The No-See-Um’s: The F<strong>in</strong>ancial Impact of CargoLosses on <strong>the</strong> Bottom L<strong>in</strong>e.” Presentation at <strong>the</strong> 2004Council of Logistics Management Annual Conferenceon October 6, 2004, by Robert S. Holley, Chubb & Son.11. The data was derived from an <strong>in</strong>terview conducted<strong>in</strong> 2005 by Abby Benson and James B. Rice, Jr.,both of MIT, as part of a study on supply cha<strong>in</strong> security.12. Examples of multiple levels of firms collaborat<strong>in</strong>g<strong>in</strong>clude sourc<strong>in</strong>g personnel work<strong>in</strong>g with sales personnel,product development personnel work<strong>in</strong>g with designeng<strong>in</strong>eers, and warehous<strong>in</strong>g managers work<strong>in</strong>g withdistribution and shipp<strong>in</strong>g managers.13. The data was derived from an <strong>in</strong>terview conducted<strong>in</strong> 2005 by Abby Benson and James B. Rice, Jr.,both of MIT, as part of a study on supply cha<strong>in</strong> security.14. The data was derived from an <strong>in</strong>terview conducted<strong>in</strong> 2003 by Federico Caniato, Visit<strong>in</strong>g StudentMIT, and James B. Rice, Jr., as part of a study on supplycha<strong>in</strong> resilience.15. Hau L. Lee and Seungj<strong>in</strong> Whang, “Higher <strong>Supply</strong>Cha<strong>in</strong> <strong>Security</strong> with Lower Cost: Lessons from TotalQuality Management,” Stanford University white paper,October 19, 2003, p. 21.26IBM Center for The Bus<strong>in</strong>ess of Government


INVESTING IN SUPPLY CHAIN SECURITY16. Reference Benson-Rice <strong>in</strong>terviews. One 3PL providerdescribed C-TPAT as a “choiceless choice becausea company that doesn’t comply will go out of bus<strong>in</strong>esss<strong>in</strong>ce all major importers require it.”17. “Secur<strong>in</strong>g <strong>the</strong> Global <strong>Supply</strong> Cha<strong>in</strong>: Customs-TradePartnership Aga<strong>in</strong>st Terrorism (C-TPAT) Strategic Plan,”U.S. Customs and Border Protection, April 2005.18. The availability of “green lanes” will vary bycountry and <strong>the</strong>ir respective progress toward develop<strong>in</strong>g<strong>the</strong> necessary technology and <strong>in</strong>frastructure to supportbuild<strong>in</strong>g “green lane” processes.19. Ref. Benson-Rice <strong>in</strong>terview.20. Ref. Benson-Rice <strong>in</strong>terview.21. Ref. Benson-Rice <strong>in</strong>terview.22. Deena S. Disraeli, “Public-Private Partnerships:<strong>Security</strong> and Emergency Response Collaboration <strong>in</strong>a New Threat Environment,” MIT Thesis, June 2004.23. Tobey Gooley, “C-TPAT: Separat<strong>in</strong>g Hype fromReality,” Logistics Management, August 1, 2004.24. Ibid.25. Data derived from a series of <strong>in</strong>terviews conductedas part of <strong>the</strong> <strong>Supply</strong> Cha<strong>in</strong> Response to Terrorismproject at MIT; see http://web.mit.edu/scresponse/ foradditional <strong>in</strong>formation.26. Ibid. Rice-Caniato <strong>in</strong>terviewswww.bus<strong>in</strong>essofgovernment.org 27


INVESTING IN SUPPLY CHAIN SECURITYA B O U T T H E A U T H O R SJames B. Rice, Jr., is <strong>the</strong> Director of <strong>the</strong> Integrated <strong>Supply</strong> Cha<strong>in</strong>Management (ISCM) Program at <strong>the</strong> Center for Transportation and Logistics(CTL) at <strong>the</strong> Massachusetts Institute of Technology, hav<strong>in</strong>g jo<strong>in</strong>ed CTL <strong>in</strong>1995. The ISCM Program is a consortium that enables companies from<strong>in</strong>dustry to <strong>in</strong>teract with faculty and researchers across MIT on educationand research <strong>in</strong> <strong>the</strong> supply cha<strong>in</strong> doma<strong>in</strong>.Mr. Rice’s research is on organization and supply cha<strong>in</strong> design, recentlyfocus<strong>in</strong>g on how supply cha<strong>in</strong>s respond to disruptions (for example, terrorism),<strong>in</strong>clud<strong>in</strong>g <strong>the</strong> role of culture and <strong>the</strong> creation of collateral benefits,and on <strong>the</strong> impact of auto-ID on supply cha<strong>in</strong> design. He also serves asproject manager for <strong>the</strong> <strong>Supply</strong> Cha<strong>in</strong> Response and <strong>the</strong> Smart Objectsprojects, and teaches a graduate course <strong>in</strong> supply cha<strong>in</strong> management.His written work <strong>in</strong>cludes published articles, such as “The RFID Journey: From Strategy to Action” upcom<strong>in</strong>g<strong>in</strong> <strong>Supply</strong> Cha<strong>in</strong> Management Review; “Build<strong>in</strong>g a Secure and Resilient <strong>Supply</strong> Network” <strong>in</strong> <strong>Supply</strong> Cha<strong>in</strong>Management Review, Sept.–Oct. 2003; “Strategic Partnership: Collaboration, Alliances and <strong>the</strong>Coord<strong>in</strong>ation Spectrum” <strong>in</strong> Logistics Solutions, Issue 1 2002; “<strong>Supply</strong> Cha<strong>in</strong> Versus <strong>Supply</strong> Cha<strong>in</strong>: The Hypeand Reality” <strong>in</strong> <strong>Supply</strong> Cha<strong>in</strong> Management Review, Sept.–Oct. 2001; and “Spann<strong>in</strong>g <strong>the</strong> FunctionalBoundaries Through Horizontal Process Management (HPM)” <strong>in</strong> <strong>Supply</strong> Cha<strong>in</strong> Management Review, Fall1997. He also contributed to <strong>the</strong> book Surviv<strong>in</strong>g <strong>Supply</strong> Cha<strong>in</strong> Integration (National Academy Press, March2000) and to a number of work<strong>in</strong>g papers prepared for CTL sponsors.In addition to his role at MIT, Mr. Rice has served <strong>the</strong> community on several supply-cha<strong>in</strong>-related boardsand committees, <strong>in</strong>clud<strong>in</strong>g <strong>the</strong> National Research Council’s Board on Manufactur<strong>in</strong>g and Eng<strong>in</strong>eer<strong>in</strong>g Design(BMAED); <strong>the</strong> editorial board of <strong>Supply</strong> Cha<strong>in</strong> Management Review and of <strong>Supply</strong> Cha<strong>in</strong> Forum: AnInternational Journal; <strong>the</strong> International Advisory Board of KLICT, a multi-year <strong>in</strong>ternational research <strong>in</strong>itiativefunded by <strong>the</strong> government of The Ne<strong>the</strong>rlands; <strong>the</strong> United States Air Force Logistics Transformation AdvisoryCommittee (chairman); and <strong>the</strong> U.S. Navy <strong>Supply</strong> Cha<strong>in</strong> Practices for Affordable Naval Systems (SPANS)Technical Advisory Board.Prior to jo<strong>in</strong><strong>in</strong>g MIT, Mr. Rice managed manufactur<strong>in</strong>g and distribution operations at Procter & Gamble, andserved as a sales and market manager at General Electric Company.Mr. Rice earned his M.B.A. <strong>in</strong> operations and f<strong>in</strong>ance from <strong>the</strong> Harvard Bus<strong>in</strong>ess School, and a bachelor’sdegree <strong>in</strong> mechanical eng<strong>in</strong>eer<strong>in</strong>g from <strong>the</strong> University of Notre Dame.28IBM Center for The Bus<strong>in</strong>ess of Government


INVESTING IN SUPPLY CHAIN SECURITYPhilip W. Spayd is a Research Affiliate, Center for Transportation andLogistics, Massachusetts Institute of Technology, and a found<strong>in</strong>g director ofGlobal Trade Systems, Inc. (GTS). GTS provides advice to companies onwork<strong>in</strong>g to make <strong>the</strong> overall operation of <strong>in</strong>ternational supply cha<strong>in</strong>s moreefficient and better able to function with resiliency <strong>in</strong> <strong>the</strong> event of a disruptionanywhere along <strong>the</strong> supply/demand axis. GTS works at <strong>the</strong> <strong>in</strong>tersectionof strategy and operations by help<strong>in</strong>g companies ensure that <strong>the</strong>ir supplycha<strong>in</strong> strategies support <strong>the</strong>ir bus<strong>in</strong>ess objectives. Prior to jo<strong>in</strong><strong>in</strong>g GTS <strong>in</strong>January 2004, Mr. Spayd served for 25 years with <strong>the</strong> U.S. Customs Serviceand <strong>the</strong> Department of Homeland <strong>Security</strong>, work<strong>in</strong>g <strong>in</strong> <strong>the</strong> U.S. and represent<strong>in</strong>gU.S. Customs globally. He was a found<strong>in</strong>g director of Operation SafeCommerce, <strong>the</strong> first public/private partnership to develop mechanisms toenhance <strong>the</strong> security of <strong>in</strong>ternational supply cha<strong>in</strong>s.As <strong>the</strong> Boston director of field operations, Customs and Border Protection, Department of Homeland <strong>Security</strong>,Mr. Spayd directed <strong>the</strong> commercial and <strong>in</strong>spectional activities of approximately 1,000 Customs and BorderProtection employees throughout <strong>the</strong> six New England states. The Boston field office was recognized for creat<strong>in</strong>gfour “best practices” warrant<strong>in</strong>g national recognition: antiterrorism passenger exam<strong>in</strong>ations, antiterrorismtra<strong>in</strong><strong>in</strong>g, <strong>in</strong>teragency maritime <strong>in</strong>telligence, and Operation Safe Commerce.Mr. Spayd was appo<strong>in</strong>ted Nor<strong>the</strong>ast regional commissioner <strong>in</strong> August 1988. Prior to that appo<strong>in</strong>tment, he wasdistrict director of Customs <strong>in</strong> Norfolk, Virg<strong>in</strong>ia, and before that, director of labor relations at Customs headquarters<strong>in</strong> Wash<strong>in</strong>gton, D.C. He began his government career <strong>in</strong> 1973 and began work at Customs <strong>in</strong> 1978.Dur<strong>in</strong>g <strong>the</strong> period of March through July 1998, Mr. Spayd was stationed <strong>in</strong> Sofia, Bulgaria, serv<strong>in</strong>g as <strong>the</strong>U.S. advisor to <strong>the</strong> Bulgarian government on counter-proliferation. He worked directly for <strong>the</strong> m<strong>in</strong>ister of <strong>the</strong>Interior and formed <strong>in</strong>ter-governmental work<strong>in</strong>g groups to share <strong>in</strong>telligence and to coord<strong>in</strong>ate operationalplann<strong>in</strong>g. He directed a jo<strong>in</strong>t Bulgaria/Romania operation at a strategic port on <strong>the</strong> Danube River to stem <strong>the</strong>flow of weapons of mass destruction components <strong>in</strong> <strong>the</strong> region.In 1992, Mr. Spayd received a Meritorious Executive Presidential Rank Award from President George H. W. Bushfor <strong>in</strong>novative management. In 1996, he received an award from <strong>the</strong> World Customs Organization for <strong>in</strong>ternationalservice <strong>in</strong> Eastern Europe. He is a Harvard Senior Executive Fellow. In April 2002, Mr. Spayd was awarded <strong>the</strong>Coalition of New England Companies for Trade (CONECT) Person of <strong>the</strong> Year Award. He received this award for hiscontributions to <strong>the</strong> facilitation of <strong>in</strong>ternational trade <strong>in</strong> New England <strong>in</strong> <strong>the</strong> face of <strong>the</strong> new security environment.Mr. Spayd is a graduate of The Pennsylvania State University with a B.A. degree <strong>in</strong> political science and of<strong>the</strong> University of Massachusetts with an M.S. degree <strong>in</strong> labor and <strong>in</strong>dustrial relations.www.bus<strong>in</strong>essofgovernment.org 29


INVESTING IN SUPPLY CHAIN SECURITYK E Y C O N T A C T I N F O R M A T I O NTo contact <strong>the</strong> authors:James B. Rice, Jr.Director, Integrated <strong>Supply</strong> Cha<strong>in</strong> ManagementCenter for Transportation and LogisticsMassachusetts Institute of Technology77 Massachusetts Avenue, Room E40-281Cambridge, MA 02139(617) 258-8584fax: (617) 253-4560e-mail: jrice@mit.eduPhilip W. SpaydGlobal Trade Systems, Inc.7 Borden RoadScituate, MA 02066(781) 545-4462e-mail: philip.spayd@globaltradesystems.com30IBM Center for The Bus<strong>in</strong>ess of Government


CENTER REPORTS AVAILABLECOLLABORATION:PARTNERSHIPS ANDNETWORKSLeverag<strong>in</strong>g Networks to MeetNational Goals: FEMA and <strong>the</strong> SafeConstruction Networks (March 2002)William L. Waugh, Jr.21st-Century Government and <strong>the</strong>Challenge of Homeland Defense(June 2002)Ela<strong>in</strong>e C. KamarckAssess<strong>in</strong>g Partnerships: New Formsof Collaboration (March 2003)Robert Klitgaard and Gregory F.TrevertonLeverag<strong>in</strong>g Networks: A Guide forPublic Managers Work<strong>in</strong>g acrossOrganizations (March 2003)Robert AgranoffExtraord<strong>in</strong>ary Results on NationalGoals: Networks and Partnerships <strong>in</strong><strong>the</strong> Bureau of Primary Health Care’s100%/0 Campaign (March 2003)John ScanlonPublic-Private Strategic Partnerships:The U.S. Postal Service-FederalExpress Alliance (May 2003)Oded ShenkarThe Challenge of Coord<strong>in</strong>at<strong>in</strong>g“Big Science” (July 2003)W. Henry LambrightCommunities of Practice: A NewTool for Government Managers(November 2003)William M. Snyder and Xavier deSouza BriggsCollaboration and PerformanceManagement <strong>in</strong> Network Sett<strong>in</strong>gs:Lessons from Three WatershedGovernance Efforts (April 2004)Mark T. ImperialThe Quest to Become “One”:An Approach to InternalCollaboration (February 2005)Russ L<strong>in</strong>denCooperation Between Social <strong>Security</strong>and Tax Agencies <strong>in</strong> Europe(April 2005)Bernhard Zaglmayer, Paul Schoukens,and Danny PietersE-GOVERNMENTSupercharg<strong>in</strong>g <strong>the</strong> EmploymentAgency: An Investigation of <strong>the</strong> Useof Information and CommunicationTechnology to Improve <strong>the</strong> Serviceof State Employment Agencies(December 2000)Anthony M. TownsendAssess<strong>in</strong>g a State’s Read<strong>in</strong>ess forGlobal Electronic Commerce:Lessons from <strong>the</strong> Ohio Experience(January 2001)J. Pari Sabety and Steven I. GordonPrivacy Strategies for ElectronicGovernment (January 2001)Jan<strong>in</strong>e S. Hiller and France BélangerCommerce Comes to Governmenton <strong>the</strong> Desktop: E-CommerceApplications <strong>in</strong> <strong>the</strong> Public Sector(February 2001)Genie N. L. StowersThe Use of <strong>the</strong> Internet <strong>in</strong>Government Service Delivery(February 2001)Steven Cohen and William EimickeState Web Portals: Deliver<strong>in</strong>g andF<strong>in</strong>anc<strong>in</strong>g E-Service (January 2002)Diana Burley Gant, Jon P. Gant, andCraig L. JohnsonInternet Vot<strong>in</strong>g: Br<strong>in</strong>g<strong>in</strong>g Electionsto <strong>the</strong> Desktop (February 2002)Robert S. DoneLeverag<strong>in</strong>g Technology <strong>in</strong> <strong>the</strong>Service of Diplomacy: Innovation<strong>in</strong> <strong>the</strong> Department of State(March 2002)Barry FultonFederal Intranet Work Sites: AnInterim Assessment (June 2002)Julianne G. Mahler and Priscilla M.ReganThe State of Federal Websites: ThePursuit of Excellence (August 2002)Genie N. L. StowersState Government E-Procurement <strong>in</strong><strong>the</strong> Information Age: Issues, Practices,and Trends (September 2002)M. Jae MoonPrepar<strong>in</strong>g for Wireless and MobileTechnologies <strong>in</strong> Government(October 2002)Ai-Mei Chang and P. K. KannanPublic-Sector Information <strong>Security</strong>:A Call to Action for Public-SectorCIOs (October 2002, 2nd ed.)Don HeimanThe Auction Model: How <strong>the</strong> PublicSector Can Leverage <strong>the</strong> Power ofE-Commerce Through DynamicPric<strong>in</strong>g (November 2002, 2nd ed.)David C. WyldThe Promise of E-Learn<strong>in</strong>g <strong>in</strong> Africa:The Potential for Public-PrivatePartnerships (January 2003)Norman LaRocque and MichaelLathamDigitally Integrat<strong>in</strong>g <strong>the</strong>Government <strong>Supply</strong> Cha<strong>in</strong>:E-Procurement, E-F<strong>in</strong>ance, andE-Logistics (February 2003)Jacques S. Gansler, WilliamLucyshyn, and Kimberly M. RossUs<strong>in</strong>g Technology to IncreaseCitizen Participation<strong>in</strong> Government: The Use of Modelsand Simulation (April 2003)John O’LooneySeaport: Chart<strong>in</strong>g a New Course forProfessional Services Acquisition forAmerica’s Navy (June 2003)David C. WyldE-Report<strong>in</strong>g: Streng<strong>the</strong>n<strong>in</strong>gDemocratic Accountability(February 2004)Mordecai LeeUnderstand<strong>in</strong>g ElectronicSignatures: The Key toE-Government (March 2004)Stephen H. HoldenMeasur<strong>in</strong>g <strong>the</strong> Performance ofE-Government(March 2004)Genie N. L. StowersRestor<strong>in</strong>g Trust <strong>in</strong> Government: ThePotential of Digital CitizenParticipation (August 2004)Marc Holzer, James Melitski, Seung-Yong Rho, and Richard SchwesterFrom E-Government toM-Government? Emerg<strong>in</strong>g Practices<strong>in</strong> <strong>the</strong> Use of Mobile Technology byState Governments (November 2004)M. Jae MoonTo download or order a copy of a report, visit <strong>the</strong> IBM Center for The Bus<strong>in</strong>ess of Government website at: www.bus<strong>in</strong>essofgovernment.org 31


CENTER REPORTS AVAILABLEGovernment Garage Sales: Onl<strong>in</strong>eAuctions as Tools for AssetManagement (November 2004)David C. WyldInnovation <strong>in</strong> E-Procurement: TheItalian Experience (November 2004)Mita MarraComputerisation and E-Government<strong>in</strong> Social <strong>Security</strong>: A ComparativeInternational Study (May 2005)Michael Adler and Paul HenmanFINANCIALMANAGEMENTCredit Scor<strong>in</strong>g and Loan Scor<strong>in</strong>g:Tools for Improved Management ofFederal Credit Programs (July 1999)Thomas H. StantonUs<strong>in</strong>g Activity-Based Cost<strong>in</strong>g toManage More Effectively(January 2000)Michael H. Granof, David E. Platt,and Igor VaysmanAudited F<strong>in</strong>ancial Statements:Gett<strong>in</strong>g and Susta<strong>in</strong><strong>in</strong>g “Clean”Op<strong>in</strong>ions (July 2001)Douglas A. BrookAn Introduction to F<strong>in</strong>ancial RiskManagement <strong>in</strong> Government(August 2001)Richard J. Buttimer, Jr.Understand<strong>in</strong>g Federal AssetManagement: An Agenda for Reform(July 2003)Thomas H. StantonEfficiency Counts: Develop<strong>in</strong>g <strong>the</strong>Capacity to Manage Costs at AirForce Materiel Command(August 2003)Michael Barzelay and FredThompsonFederal Credit Programs: Manag<strong>in</strong>gRisk <strong>in</strong> <strong>the</strong> Information Age(April 2005)Thomas H. StantonHUMAN CAPITALMANAGEMENTProfiles <strong>in</strong> Excellence: Conversationswith <strong>the</strong> Best of America’s CareerExecutive Service (November 1999)Mark W. HuddlestonReflections on Mobility: CaseStudies of Six Federal Executives(May 2000)Michael D. Serl<strong>in</strong>Manag<strong>in</strong>g Telecommut<strong>in</strong>g <strong>in</strong> <strong>the</strong>Federal Government: An InterimReport (June 2000)G<strong>in</strong>a Vega and Louis BrennanUs<strong>in</strong>g Virtual Teams to ManageComplex Projects: A Case Study of<strong>the</strong> Radioactive Waste ManagementProject (August 2000)Samuel M. DeMarieA Learn<strong>in</strong>g-Based Approach toLead<strong>in</strong>g Change (December 2000)Barry SugarmanLabor-Management Partnerships:A New Approach to CollaborativeManagement (July 2001)Barry Rub<strong>in</strong> and Richard Rub<strong>in</strong>W<strong>in</strong>n<strong>in</strong>g <strong>the</strong> Best and Brightest:Increas<strong>in</strong>g <strong>the</strong> Attraction of PublicService (July 2001)Carol ChetkovichA Weapon <strong>in</strong> <strong>the</strong> War for Talent:Us<strong>in</strong>g Special Authorities to RecruitCrucial Personnel (December 2001)Hal G. Ra<strong>in</strong>eyA Chang<strong>in</strong>g Workforce:Understand<strong>in</strong>g Diversity Programs<strong>in</strong> <strong>the</strong> Federal Government(December 2001)Ka<strong>the</strong>r<strong>in</strong>e C. Naff and J. EdwardKelloughLife after Civil Service Reform:The Texas, Georgia, and FloridaExperiences (October 2002)Jonathan WaltersThe Defense Leadership andManagement Program: Tak<strong>in</strong>gCareer Development Seriously(December 2002)Joseph A. Ferrara and Mark C. RomThe Influence of OrganizationalCommitment on Officer Retention:A 12-Year Study of U.S. ArmyOfficers (December 2002)Stephanie C. Payne, Ann H.Huffman, and Trueman R. Tremble, Jr.Human Capital Reform: 21stCentury Requirements for <strong>the</strong> UnitedStates Agency for InternationalDevelopment (March 2003)Anthony C. E. Qua<strong>in</strong>ton andAmanda M. FulmerModerniz<strong>in</strong>g Human ResourceManagement <strong>in</strong> <strong>the</strong> FederalGovernment: The IRS Model(April 2003)James R. Thompson and Hal G.Ra<strong>in</strong>eyMediation at Work: Transform<strong>in</strong>gWorkplace Conflict at <strong>the</strong> UnitedStates Postal Service (October 2003)Lisa B. B<strong>in</strong>ghamGrow<strong>in</strong>g Leaders for Public Service(August 2004, 2nd ed.)Ray BluntPay for Performance: A Guide forFederal Managers (November 2004)Howard RisherThe Blended Workforce: Maximiz<strong>in</strong>gAgility Through Nonstandard WorkArrangements (April 2005)James R. Thompson and Sharon H.MastracciINNOVATIONManag<strong>in</strong>g Workfare: The Case of<strong>the</strong> Work Experience Program <strong>in</strong><strong>the</strong> New York City Parks Department(June 1999)Steven CohenNew Tools for Improv<strong>in</strong>gGovernment Regulation: AnAssessment of Emissions Trad<strong>in</strong>gand O<strong>the</strong>r Market-Based RegulatoryTools (October 1999)Gary C. BrynerReligious Organizations, Anti-Poverty Relief, and CharitableChoice: A Feasibility Study of Faith-Based Welfare Reform <strong>in</strong> Mississippi(November 1999)John P. Bartkowski and Helen A. Regis32To download or order a copy of a report, visit <strong>the</strong> IBM Center for The Bus<strong>in</strong>ess of Government website at: www.bus<strong>in</strong>essofgovernment.org


Bus<strong>in</strong>ess Improvement Districts andInnovative Service Delivery(November 1999)Jerry MitchellAn Assessment of BrownfieldRedevelopment Policies: TheMichigan Experience(November 1999)Richard C. HulaSan Diego County’s InnovationProgram: Us<strong>in</strong>g Competition and aWhole Lot More to Improve PublicServices (January 2000)William B. EimickeInnovation <strong>in</strong> <strong>the</strong> Adm<strong>in</strong>istrationof Public Airports (March 2000)Scott E. TarryEntrepreneurial Government:Bureaucrats as Bus<strong>in</strong>esspeople(May 2000)Anne LaurentReth<strong>in</strong>k<strong>in</strong>g U.S. EnvironmentalProtection Policy: ManagementChallenges for a New Adm<strong>in</strong>istration(November 2000)Dennis A. Rond<strong>in</strong>elliThe Challenge of Innovat<strong>in</strong>g<strong>in</strong> Government (February 2001)Sandford Bor<strong>in</strong>sUnderstand<strong>in</strong>g Innovation:What Inspires It? What MakesIt Successful? (December 2001)Jonathan WaltersGovernment Management ofInformation Mega-Technology:Lessons from <strong>the</strong> Internal RevenueService’s Tax Systems Modernization(March 2002)Barry BozemanAdvanc<strong>in</strong>g High End Comput<strong>in</strong>g:L<strong>in</strong>k<strong>in</strong>g to National Goals(September 2003)Juan D. Rogers and Barry BozemanMANAGING FORPERFORMANCE ANDRESULTSCorporate Strategic Plann<strong>in</strong>g <strong>in</strong>Government: Lessons from <strong>the</strong>United States Air Force(November 2000)Col<strong>in</strong> CampbellUs<strong>in</strong>g Evaluation to SupportPerformance Management:A Guide for Federal Executives(January 2001)Kathryn Newcomer and Mary AnnScheirerManag<strong>in</strong>g for Outcomes: MilestoneContract<strong>in</strong>g <strong>in</strong> Oklahoma(January 2001)Peter Frumk<strong>in</strong>The Challenge of Develop<strong>in</strong>gCross-Agency Measures:A Case Study of <strong>the</strong> Office ofNational Drug Control Policy(August 2001)Patrick J. Murphy and John CarnevaleThe Potential of <strong>the</strong> GovernmentPerformance and Results Act as aTool to Manage Third-PartyGovernment (August 2001)David G. FredericksonUs<strong>in</strong>g Performance Data forAccountability: The New York CityPolice Department’s CompStatModel of Police Management(August 2001)Paul E. O’ConnellMov<strong>in</strong>g Toward More CapableGovernment: A Guide toOrganizational Design (June 2002)Thomas H. StantonThe Baltimore CitiStat Program:Performance and Accountability(May 2003)Lenneal J. HendersonStrategies for Us<strong>in</strong>g StateInformation: Measur<strong>in</strong>g andImprov<strong>in</strong>g Program Performance(December 2003)Shelley H. MetzenbaumL<strong>in</strong>k<strong>in</strong>g Performance and Budget<strong>in</strong>g:Opportunities <strong>in</strong> <strong>the</strong> Federal BudgetProcess (January 2004, 2nd ed.)Philip G. JoyceHow Federal Programs Use OutcomeInformation: Opportunities forFederal Managers(February 2004, 2nd ed.)Harry P. Hatry, Ela<strong>in</strong>e Morley, ShelliB. Rossman, and Joseph S. WholeyPerformance Leadership: 11 BetterPractices That Can Ratchet UpPerformance (May 2004)Robert D. BehnPerformance Management forCareer Executives: A “Start WhereYou Are, Use What You Have” Guide(October 2004, 2nd ed.)Chris WyeStay<strong>in</strong>g <strong>the</strong> Course: The Use ofPerformance Measurement <strong>in</strong> StateGovernments (November 2004)Julia Melkers and Ka<strong>the</strong>r<strong>in</strong>eWilloughbyMARKET-BASEDGOVERNMENTDeterm<strong>in</strong><strong>in</strong>g a Level Play<strong>in</strong>g Fieldfor Public-Private Competition(November 1999)Lawrence L. Mart<strong>in</strong>Implement<strong>in</strong>g State Contracts forSocial Services: An Assessment of<strong>the</strong> Kansas Experience (May 2000)Jocelyn M. Johnston and Barbara S.RomzekA Vision of <strong>the</strong> Government asa World-Class Buyer: MajorProcurement Issues for <strong>the</strong> Com<strong>in</strong>gDecade (January 2002)Jacques S. GanslerContract<strong>in</strong>g for <strong>the</strong> 21st Century:A Partnership Model (January 2002)Wendell C. Law<strong>the</strong>rFranchise Funds <strong>in</strong> <strong>the</strong> FederalGovernment: End<strong>in</strong>g <strong>the</strong> Monopoly<strong>in</strong> Service Provision (February 2002)John J. CallahanMak<strong>in</strong>g Performance-BasedContract<strong>in</strong>g Perform: What <strong>the</strong>Federal Government Can Learn fromState and Local Governments(November 2002, 2nd ed.)Lawrence L. Mart<strong>in</strong>Mov<strong>in</strong>g to Public-PrivatePartnerships: Learn<strong>in</strong>g fromExperience around <strong>the</strong> World(February 2003)Trefor P. WilliamsIT Outsourc<strong>in</strong>g: A Primer for PublicManagers (February 2003)Yu-Che Chen and James PerryThe Procurement Partnership Model:Mov<strong>in</strong>g to a Team-Based Approach(February 2003)Kathryn G. DenhardtTo download or order a copy of a report, visit <strong>the</strong> IBM Center for The Bus<strong>in</strong>ess of Government website at: www.bus<strong>in</strong>essofgovernment.org 33


CENTER REPORTS AVAILABLEMov<strong>in</strong>g Toward Market-BasedGovernment: The Chang<strong>in</strong>g Roleof Government as <strong>the</strong> Provider(March 2004, 2nd ed.)Jacques S. GanslerTransborder Service Systems:Pathways for Innovation or Threatsto Accountability? (March 2004)Alasdair RobertsCompetitive Sourc<strong>in</strong>g: WhatHappens to Federal Employees?(October 2004)Jacques S. Gansler and WilliamLucyshynImplement<strong>in</strong>g Alternative Sourc<strong>in</strong>gStrategies: Four Case Studies(October 2004)Edited by Jacques S. Gansler andWilliam LucyshynDesign<strong>in</strong>g Competitive Bidd<strong>in</strong>gfor Medicare (November 2004)John Cawley and Andrew B.WhitfordTRANSFORMATION OFORGANIZATIONSThe Importance of Leadership:The Role of School Pr<strong>in</strong>cipals(September 1999)Paul Teske and Mark SchneiderLeadership for Change: Case Studies<strong>in</strong> American Local Government(September 1999)Robert B. Denhardt and JanetV<strong>in</strong>zant DenhardtManag<strong>in</strong>g DecentralizedDepartments: The Case of <strong>the</strong>U.S. Department of Health andHuman Services (October 1999)Beryl A. Rad<strong>in</strong>Transform<strong>in</strong>g Government: TheRenewal and Revitalization of <strong>the</strong>Federal Emergency ManagementAgency (April 2000)R. Steven Daniels and Carolyn L.Clark-DanielsTransform<strong>in</strong>g Government: Creat<strong>in</strong>g<strong>the</strong> New Defense ProcurementSystem (April 2000)Kimberly A. HarokopusTrans-Atlantic Experiences <strong>in</strong> HealthReform: The United K<strong>in</strong>gdom’sNational Health Service and <strong>the</strong>United States Veterans HealthAdm<strong>in</strong>istration (May 2000)Marilyn A. DeLucaTransform<strong>in</strong>g Government: TheRevitalization of <strong>the</strong> Veterans HealthAdm<strong>in</strong>istration (June 2000)Gary J. YoungThe Challenge of Manag<strong>in</strong>g AcrossBoundaries: The Case of <strong>the</strong> Officeof <strong>the</strong> Secretary <strong>in</strong> <strong>the</strong> U.S.Department of Health and HumanServices (November 2000)Beryl A. Rad<strong>in</strong>Creat<strong>in</strong>g a Culture of Innovation:10 Lessons from America’s Best RunCity (January 2001)Janet V<strong>in</strong>zant Denhardt and RobertB. DenhardtTransform<strong>in</strong>g Government: DanGold<strong>in</strong> and <strong>the</strong> Remak<strong>in</strong>g of NASA(March 2001)W. Henry LambrightManag<strong>in</strong>g Across Boundaries: ACase Study of Dr. Helene Gayle and<strong>the</strong> AIDS Epidemic (January 2002)Norma M. RiccucciManag<strong>in</strong>g “Big Science”: A CaseStudy of <strong>the</strong> Human Genome Project(March 2002)W. Henry LambrightThe Power of Frontl<strong>in</strong>e Workers <strong>in</strong>Transform<strong>in</strong>g Government: TheUpstate New York VeteransHealthcare Network (April 2003)Timothy J. HoffMak<strong>in</strong>g Public Sector Mergers Work:Lessons Learned (August 2003)Peter Frumk<strong>in</strong>Efficiency Counts: Develop<strong>in</strong>g <strong>the</strong>Capacity to Manage Costs at AirForce Materiel Command(August 2003)Michael Barzelay and FredThompsonManag<strong>in</strong>g <strong>the</strong> New Multipurpose,Multidiscipl<strong>in</strong>e University ResearchCenters: Institutional Innovation<strong>in</strong> <strong>the</strong> Academic Community(November 2003)Barry Bozeman and P. CraigBoardman2004 PRESIDENTIALTRANSITION SERIESGovernment Reorganization:Strategies and Tools to Get It Done(August 2004)Hannah SistarePerformance Management forPolitical Executives: A “Start WhereYou Are, Use What You Have” Guide(October 2004)Chris WyeBecom<strong>in</strong>g an Effective PoliticalExecutive: 7 Lessons fromExperienced Appo<strong>in</strong>tees(January 2005, 2nd ed.)Judith E. MichaelsGett<strong>in</strong>g to Know You: Rules ofEngagement for Political Appo<strong>in</strong>teesand Career Executives(January 2005)Joseph A. Ferrara and Lynn C. RossSPECIAL REPORTSEnhanc<strong>in</strong>g <strong>Security</strong> Throughout <strong>the</strong><strong>Supply</strong> Cha<strong>in</strong> (April 2004)David J. Closs and Edmund F.McGarrellAssess<strong>in</strong>g <strong>the</strong> Impact of IT-DrivenEducation <strong>in</strong> K–12 Schools(May 2005)Ganesh D. Bhatt<strong>Invest<strong>in</strong>g</strong> <strong>in</strong> <strong>Supply</strong> Cha<strong>in</strong> <strong>Security</strong>:<strong>Collateral</strong> <strong>Benefits</strong> (May 2005)James B. Rice, Jr., and Philip W. SpaydCENTER FOR HEALTHCAREMANAGEMENT REPORTSThe Power of Frontl<strong>in</strong>e Workers<strong>in</strong> Transform<strong>in</strong>g HealthcareOrganizations: The Upstate NewYork Veterans Healthcare Network(December 2003)Timothy J. HoffIT Outsourc<strong>in</strong>g: A Primer forHealthcare Managers(December 2003)Yu-Che Chen and James Perry34To download or order a copy of a report, visit <strong>the</strong> IBM Center for The Bus<strong>in</strong>ess of Government website at: www.bus<strong>in</strong>essofgovernment.org


BOOKS*Collaboration: Us<strong>in</strong>g Networks andPartnerships(Rowman & Littlefield Publishers,Inc., 2004)John M. Kamensky and Thomas J.Burl<strong>in</strong>, editorsE-Government 2001(Rowman & Littlefield Publishers,Inc., 2001)Mark A. Abramson and Grady E.Means, editorsE-Government 2003(Rowman & Littlefield Publishers,Inc., 2002)Mark A. Abramson and Therese L.Mor<strong>in</strong>, editorsHuman Capital 2002(Rowman & Littlefield Publishers,Inc., 2002)Mark A. Abramson and NicoleWillenz Gardner, editorsHuman Capital 2004(Rowman & Littlefield Publishers,Inc., 2004)Jonathan D. Breul and NicoleWillenz Gardner, editorsInnovation(Rowman & Littlefield Publishers,Inc., 2002)Mark A. Abramson and Ian Littman,editorsLeaders(Rowman & Littlefield Publishers,Inc., 2002)Mark A. Abramson and Kev<strong>in</strong> M.Bacon, editorsLearn<strong>in</strong>g <strong>the</strong> Ropes: Insights forPolitical Appo<strong>in</strong>tees(Rowman & Littlefield Publishers,Inc., 2005)Mark A. Abramson and Paul R.Lawrence, editorsManag<strong>in</strong>g for Results 2002(Rowman & Littlefield Publishers,Inc., 2001)Mark A. Abramson and John M.Kamensky, editorsManag<strong>in</strong>g for Results 2005(Rowman & Littlefield Publishers,Inc., 2004)John M. Kamensky and AlbertMorales, editorsMemos to <strong>the</strong> President:Management Advice from <strong>the</strong>Nation’s Top Public Adm<strong>in</strong>istrators(Rowman & Littlefield Publishers,Inc., 2001)Mark A. Abramson, editorNew Ways of Do<strong>in</strong>g Bus<strong>in</strong>ess(Rowman & Littlefield Publishers,Inc., 2003)Mark A. Abramson and Ann M.Kieffaber, editorsThe Procurement Revolution(Rowman & Littlefield Publishers,Inc., 2003)Mark A. Abramson and Roland S.Harris III, editorsTransform<strong>in</strong>g Government <strong>Supply</strong>Cha<strong>in</strong> Management(Rowman & Littlefield Publishers,Inc., 2003)Jacques S. Gansler and Robert E.Luby, Jr., editorsTransform<strong>in</strong>g Organizations(Rowman & Littlefield Publishers,Inc., 2001)Mark A. Abramson and Paul R.Lawrence, editors* Available at bookstores, onl<strong>in</strong>e booksellers, and from <strong>the</strong> publisher (www.rowmanlittlefield.com or 800-462-6420). 35


About <strong>the</strong> IBM Center for The Bus<strong>in</strong>ess of GovernmentThrough research stipends and events, <strong>the</strong> IBM Center forThe Bus<strong>in</strong>ess of Government stimulates research and facilitatesdiscussion on new approaches to improv<strong>in</strong>g <strong>the</strong> effectiveness ofgovernment at <strong>the</strong> federal, state, local, and <strong>in</strong>ternational levels.The Center is one of <strong>the</strong> ways that IBM seeks to advanceknowledge on how to improve public sector effectiveness.The IBM Center focuses on <strong>the</strong> future of <strong>the</strong> operation andmanagement of <strong>the</strong> public sector.About IBM Bus<strong>in</strong>ess Consult<strong>in</strong>g ServicesWith consultants and professional staff <strong>in</strong> more than 160 countriesglobally, IBM Bus<strong>in</strong>ess Consult<strong>in</strong>g Services is <strong>the</strong> world’s largestconsult<strong>in</strong>g services organization. IBM Bus<strong>in</strong>ess Consult<strong>in</strong>g Servicesprovides clients with bus<strong>in</strong>ess process and <strong>in</strong>dustry expertise, adeep understand<strong>in</strong>g of technology solutions that address specific<strong>in</strong>dustry issues, and <strong>the</strong> ability to design, build and run thosesolutions <strong>in</strong> a way that delivers bottom-l<strong>in</strong>e bus<strong>in</strong>ess value. Formore <strong>in</strong>formation visit www.ibm.com/bcs.For additional <strong>in</strong>formation, contact:Mark A. AbramsonExecutive DirectorIBM Center for The Bus<strong>in</strong>ess of Government1301 K Street, NWFourth Floor, West TowerWash<strong>in</strong>gton, DC 20005(202) 515-4504, fax: (202) 515-4375e-mail: bus<strong>in</strong>essofgovernment@us.ibm.comwebsite: www.bus<strong>in</strong>essofgovernment.org

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!