30.11.2012 Views

Untitled - Ministerstwo Rozwoju Regionalnego

Untitled - Ministerstwo Rozwoju Regionalnego

Untitled - Ministerstwo Rozwoju Regionalnego

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

and consist of defining information interchange standards (EDIFACT, XML), encoding<br />

channels (such as HTTPS, SFTP), all the way to user help-desk solutions<br />

and 24/7 assistance 3 . The role of IT support does not end at the moment of completing<br />

successful integration of the systems of chain/network participants. It is<br />

also necessary to maintain the efficiency of the system. It turns out that in a crisis<br />

situation it is the close co-operation between all system users that proves to<br />

be most effective. This also applies to having a combined negotiating power in<br />

relations with a company, e.g., telecom operator, which is not part of the<br />

chain/network, allowing for having breakdowns repaired quickly. The operational<br />

effectiveness of such a system is measured thorough KPI (Key Performance<br />

Indicator). This can be done, among others, with the use of Internet available<br />

tools, which can, to a certain degree, be configured to customer's expectations<br />

and then generated and e-mailed automatically 4 .<br />

It is worth pointing out that this type of integration service is relatively recent<br />

and indicates developmental direction of logistic providers' product range.<br />

Owing to the substantial increase in the role of IT, it is also included as part of<br />

provider's core competences.<br />

9.4. Security of information<br />

Access to information and its quality are key factors of effective management of<br />

an integrated supply chain. Logistics provider, acting as the link between individual<br />

parts of the chain should ensure flow of credible and detailed information<br />

between all chain participants. The bases of this process are formed by internally<br />

created company procedures which ensure appropriate level of security.<br />

This can be done by establishing clear Information Security Policy (ISP) and<br />

setting up of job posts which will safeguard its proper functioning. If “security”<br />

is of key importance to a company, the Security System Administrator, who acts<br />

independently of the IT team, reports directly to the Board. In accordance with<br />

the ISP, every critically important IT system should have defined security requirements<br />

in the area of access, confidentiality and integrity, which from the<br />

business perspective are seen as quality requirements of these systems.<br />

The analysis of IT hazards and their impact determines the degree of IT system<br />

availability of business processes for logistic operators. Based on the recommendations<br />

of such analysis, a decision on back-up processing units and WAN<br />

3 Setting of various service levels usually takes place depending on customer expectations regarding<br />

time of response to reported breakdowns and the time of repair.<br />

4 In case of the global logistics provider Schenker, these are among others: Advanced Tracking, Econnect<br />

or Lopass.<br />

186

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!