Documente Academic
Documente Profesional
Documente Cultură
Logistics Informatics:
Innovative Perspectives
Zongwei Luo
University of Hong Kong, China
Copyright © 2010 by IGI Global. All rights reserved. No part of this publication may be reproduced, stored or distributed in
any form or by any means, electronic or mechanical, including photocopying, without written permission from the publisher.
Product or company names used in this set are for identification purposes only. Inclusion of the names of the products or
companies does not indicate a claim of ownership by IGI Global of the trademark or registered trademark.
Service science and logistics informatics : innovative perspectives / Zongwei Luo, editor. p. cm.
Includes bibliographical references and index.
Summary: "This book provides both business and IT professionals a reference for practices and guidelines to service innovation
in logistics and supply chain management"--Provided by publisher.
ISBN 978-1-61520-603-2 (hbk.) 1. Business logistics--Information technology. 2.
Service industries--Information technology. I. Luo, Zongwei, 1971-
HD38.5.S497 2010
658.500285--dc22
2009047131
All work contributed to this book is new, previously-unpublished material. The views expressed in this book are those of the
authors, but not necessarily of the publisher.
List of Reviewers
Edgar E. Blanco, Massachusetts Institute of Technology, USA
Kevin Cullinane, Edinburgh Napier University, UK
Henry Fan, Nanyang Technological University, Singapore
Hans-Dietrich Hassis, University of Bremen, Germany
Frank Straube, TU Berlin, Germany
Chelsea C. White III, Georgia Institute of Technology, USA
Xiong Youlung, Huazhong University of Science and Technology, China
Jose Humberto Ablanedo Rosas, University of Texas at El Paso, USA
Evon Abu-Taieh, Arab Academy for Banking and Financial Sciences, Jordan
Mohammad M Amini, The University of Memphis, USA
Frank Arendt, ISL Institute of Shipping Economics and Logistics, Germany
Gildas Avoine, Universit catholique de Louvain, Belgium
Indranil Bose, University of Hong Kong, Hong Kong
Miguel Gasto Cedillo-Campos, Supply Chain Research and Development Center, Mexico
Naoufel Cheikhrouhou, Ecole Polytechnique Fedrale de Lausanne, Switzerland
Weiping Chen, Virginia Tech, USA
Paul Chou, IBM Thomas J. Watson Research Center, USA
Kim Seung Chul, Hanyang University, Korea
Christophe Claramunt, Naval Academy Research Institute, France
Fragniere Emmanuel, Haute Ecole de Gestion de Genève, Switzerland
Yulian Fei, Zhejiang Gongshang University, China
Samuel Fosso Wamba, University of Wollongong, Australia
GR Gangadharan, Novay, The Netherlands
Xin Guo, University of California - Berkeley, USA
Byung-In Kim, Pohang University of Science and Technology (POSTECH), Korea
Sheung-Kown Kim, Korea University, Korea
Danuta Kisperska-Moron, Karol Adamiecki University of Economics, Poland
Senthil Kumar, CMS College of Science and Commerce, India
Andrew Lim, City University of Hong Kong, Hong Kong
Chad Lin, Curtin University of Technology, Australia
Miao Lixing, Tsinghua University, China
Dubosson Magali, Haute Ecole de Gestion de Genève, Switzerland
Sanjay Misra, Atilim University, Turkey
Shima Mohebbi, K.N.Toosi University of Technology, Iran
Zhang Mun, Shenzhen-Jinan University, China
Malgorzata Pankowska, University of Economics, Poland
Hennariina Pulli, University of Turku, Finland
Venky N. Shankar, Pennsylvania State University, USA
Jun Shu, Pennsylvania State University, USA
Ulla Tapaninen, University of Turku, Finland
Amy J.C. Trappey, National Taipei University of Technology, Taiwan
Bikem Tukeli, Isik University, Turkey
David Walters, University of Sydney, Australia
John R. Williams, Massachusetts Institute of Technology, USA
Benjamin Yen, University of Hong Kong, Hong Kong
Banu Yuksel Ozkaya, Hacettepe University, Turkey
Guoqing Zhang, University of Windsor, Canada
Chen Zhou, Georgia Institute of Technology, USA
Table of Contents
Foreword ............................................................................................................................................. xv
Preface ..............................................................................................................................................xviii
Section 1
Innovation Strategies and Mechanisms
Chapter 1
Innovative Strategies for Logistics Process ............................................................................................ 1
Bikem Turkeli, Marmara University, Turkey
Alp Ariburnu, Marmara University, Turkey
Ozalp Vayvay, Marmara University, Turkey
Chapter 2
Research on the Innovation Mechanism and Model of Logistics Enterprise:
A Chinese Perspective........................................................................................................................... 21
Zhang Mu, Jinan University, China
Li Wenli, Jinan University, China
Luo Jing, Jinan University, China
Ye Xiang, Jinan University, China
Ren Congying, Jinan University, China
Wu Chengjuan, Jinan University, China
Section 2
Logistics and Service Innovation
Chapter 3
Managing Customer-Centric Information: The Challenges of Information and Communication
Technology (ICT) Deployment in Service Environments .................................................................... 46
Martin R. Fellenz, Trinity College Dublin, Ireland
Mairead Brady, Trinity College Dublin, Ireland
Chapter 4
Impact of Wireless Sensor Network Technology on Service Innovation in
Supply Chain Management ................................................................................................................... 65
Gong Li, North Dakota State University, USA
Jing Shi, North Dakota State University, USA
Chapter 5
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags ........ 97
Han Tao, Shanghai Jiao Tong University, China
Shui Yongan, Shanghai Jiao Tong University, China
Section 3
Logistics Informatics and Information Logistics
Chapter 6
Information Needs of Logistics Service Providers ............................................................................. 113
Ulla Tapaninen, Merikotka Research Center, Finland
Hennariina Pulli, Merikotka Research Center, Finland
Antti Posti, Merikotka Research Center, Finland
Chapter 7
IT Audit for Information Logistics...................................................................................................... 128
Malgorzata Pankowska, University of Economics, Katowice, Poland
Chapter 8
Information and Communication Technology in Logistics as a Comparative Advantage ................. 144
Roman Gumzej, University of Maribor, Slovenia
Martin Lipičnik, University of Maribor, Slovenia
Chapter 9
How to Market OR/MS Decision Support .......................................................................................... 157
Masayuki Ueda, Sapporo University, Japan
Section 4
Service Sourcing and Supplier Management
Chapter 10
A Multicriteria Tool for Evaluating Performance of Service Suppliers:
The Case Of Met-Mex Peñoles Supply Chain .................................................................................... 173
Albalicia Martínez Hernández, Universidad Tecnológica de Torreón, Mexico
Mario Cantú Sifuentes, Corporación Mexicana de Investigación en Materiales, S.A.
de C.V. Mexico
Miguel Gastón Cedillo Campos, Tecnológico de Monterrey, Mexico
Chapter 11
Analyzing Requirements and Approaches for Sourcing Software Based Services ............................ 195
G.R. Gangadharan, Novay, The Netherlands
Erwin Fielt, Queensland University of Technology, Australia
Chapter 12
Supplier Relationship Management in Health Care............................................................................ 206
Tobias Mettler, University of St. Gallen, Switzerland & SAP Research St. Gallen, Switzerland
Peter Rohner, University of St. Gallen, Switzerland
Section 5
Service Management in Industries
Chapter 13
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports......................... 230
Joyce M.W Low, National University of Singapore, Singapore
Loon Ching Tang, National University of Singapore, Singapore
Xue-Ming Yuan, Singapore Institute of Manufacturing Technology, Singapore
Chapter 14
Lifecycle Management of SLAs for Service Enterprises ................................................................... 251
Yang Li, Applications & Services, Research & Technology, British Telecom, UK
Chapter 15
Cyber Transportation Logistics: Architecting a Global Value-Chain for Services ............................. 272
Yupo Chan, University of Arkansas at Little Rock, USA
Jaouad Boukachour, School of Logistics, France
Chia-Chu Chiang, University of Arkansas at Little Rock, USA
Madan Mohan Dey, University of Arkansas at Pine Bluff, USA
Charles-Henri Fredouet, School of Logistics, France
Hing-Po Lo, City University of Hong Kong, China
Farhad Moeeni, Arkansas State University, USA
Albert K. Toh, University of Arkansas at Pine Bluff, USA
Section 6
Industry Service Models, Profession Development and Outlook
Chapter 16
Perceived Risk Management: Applying the TEID Model to the Traveler Service Chain .................. 299
Magali Dubosson, Haute Ecole de Gestion de Geneve (HEG), Switzerland
Emmanuel Fragnière, Haute Ecole de Gestion de Geneve (HEG), Switzerland & University
of Bath, Switzerland
Chapter 17
Prediction Reliability of Container Terminal Simulation Models: A Before and After Study ........... 315
Armando Carteni, University of Salerno, Italy
Chapter 18
New Profession Development: The Case for the Business Process Engineer .................................... 336
Ying Tat Leung, IBM Almaden Research Center, USA
Nathan S. Caswell, Janus Consulting, USA
Manjunath Kamath, Oklahoma State University, USA
Chapter 19
Logistics Services in the 21st Century: Supply Chain Integration and Service Architecture ............. 359
Marcus Thiell, The Universidad de los Andes, Columbia
Sergio Hernandez, The Universidad de los Andes, Columbia
Foreword ............................................................................................................................................. xv
Section 1
Innovation Strategies and Mechanisms
Chapter 1
Innovative Strategies for Logistics Process ............................................................................................ 1
Bikem Turkeli, Marmara University, Turkey
Alp Ariburnu, Marmara University, Turkey
Ozalp Vayvay, Marmara University, Turkey
In this chapter, innovative strategies for logistics processes that can be used practically in business envi-
ronment are mentioned. For each innovative strategy title, tools that can be used to innovate operations
are presented. By innovating logistics processes, logistics providers can fulfill customer needs rapidly
and increase their profit because of having competitive advantage.
Chapter 2
Research on the Innovation Mechanism and Model of Logistics Enterprise:
A Chinese Perspective........................................................................................................................... 21
Zhang Mu, Jinan University, China
Li Wenli, Jinan University, China
Luo Jing, Jinan University, China
Ye Xiang, Jinan University, China
Ren Congying, Jinan University, China
Wu Chengjuan, Jinan University, China
A real case is selected for Shenzhen China Overseas Logistics Co. LTD (COL) as the empirical objects
to analyze its character of the technology and non-technology innovation, and summarize its inner and
outer driving force on promoting the service innovation. Thereafter, the typical service innovative model
based on innovative driving force has been discussed.
Section 2
Logistics and Service Innovation
Chapter 3
Managing Customer-Centric Information: The Challenges of Information and Communication
Technology (ICT) Deployment in Service Environments .................................................................... 46
Martin R. Fellenz, Trinity College Dublin, Ireland
Mairead Brady, Trinity College Dublin, Ireland
This chapter reviews the difficulties inherent in using ICTs to manage customer-related information,
and identifies the particular challenges for customer-centric deployment of ICTs. It provides a model
of different levels of customer centric information use in organizations which helps understand how
companies can become more customer centric in their information use. It reviews implications for future
research in this emerging area and concludes that the challenges of ICT deployment and use must be
addressed with an uncompromising focus on customer value as the central principle of both ICT design
and deployment, and of information management in service organizations.
Chapter 4
Impact of Wireless Sensor Network Technology on Service Innovation in
Supply Chain Management ................................................................................................................... 65
Gong Li, North Dakota State University, USA
Jing Shi, North Dakota State University, USA
This chapter provides an overview about wireless sensor network technology (WSN), how this technology
can be applied to modern industries and especially bring service innovation to supply chain manage-
ment. The impact of information technologies on supply chain management and service innovation is
discussed. Two case studies are provided to illustrate the application of WSN for service innovation in
both cold chain management and healthcare settings.
Chapter 5
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags ........ 97
Han Tao, Shanghai Jiao Tong University, China
Shui Yongan, Shanghai Jiao Tong University, China
It overviews a complementary technology to the integrated circuit based radio frequency identification
(RFID) - surface acoustic wave (SAW) based RFID. The fundamental principle and applications of
SAW RFID are presented. In order to guarantee the encoding capacity and reliable reading range, the
design criteria in coding scheme, tag design and a time domain interrogated reader design are discussed
in detail.
Section 3
Logistics Informatics and Information Logistics
Chapter 6
Information Needs of Logistics Service Providers ............................................................................. 113
Ulla Tapaninen, Merikotka Research Center, Finland
Hennariina Pulli, Merikotka Research Center, Finland
Antti Posti, Merikotka Research Center, Finland
This chapter studies is on logistics service providers (LSPs) that are representatives of typical Finnish
supply chains. The purpose of the chapter is to point out the current level of information sharing in sup-
ply chains focusing on the information needs of logistics companies, particularly from the LSP’s point
of view. It revealed that there is a lack of logistics information in the supply chain. The information
distribution should be intensified when aiming at achieving a more efficient supply chain.
Chapter 7
IT Audit for Information Logistics...................................................................................................... 128
Malgorzata Pankowska, University of Economics, Katowice, Poland
It is focused on how information logistics in business organization is supported by standards and best
practices of auditing. CobiT, ITIL, ISO/IEC 27002, Val IT as well as the Sarbanes-Oxley Act and ITAF
model are analyzed in the aspect of information logistics.
Chapter 8
Information and Communication Technology in Logistics as a Comparative Advantage ................. 144
Roman Gumzej, University of Maribor, Slovenia
Martin Lipičnik, University of Maribor, Slovenia
In a time, when the “economic crisis” is filling the news, it may seem hard to even think about improve-
ments in terms of research and development, since “there are lacking funds even for the reproduction”.
However, also the last economic “revolution” was “born” in a crisis. Therefore it is sensible to look at
the current situation as an opportunity for the next economic revolution, bringing the economy a new
cycle of development.
Chapter 9
How to Market OR/MS Decision Support .......................................................................................... 157
Masayuki Ueda, Sapporo University, Japan
The OR/MS decision support is investigated from a new viewpoint of service. It is shown that OR/MS
decision support shares characteristics with service and hence can be considered as a kind of service. It
turns out that there is surely a problem with communication gap between decision makers and decision
supporters. It is effective to utilize “problem specification”, which is a decision-maker-friendly descrip-
tion of problems, as one approach to bridge the communication gap.
Section 4
Service Sourcing and Supplier Management
Chapter 10
A Multicriteria Tool for Evaluating Performance of Service Suppliers:
The Case Of Met-Mex Peñoles Supply Chain .................................................................................... 173
Albalicia Martínez Hernández, Universidad Tecnológica de Torreón, Mexico
Mario Cantú Sifuentes, Corporación Mexicana de Investigación en Materiales, S.A.
de C.V. Mexico
Miguel Gastón Cedillo Campos, Tecnológico de Monterrey, Mexico
The quality of service is certainly a complex topic that many companies, although interested in the sub-
ject, difficult to address. It is important to define and detect both internal and external suppliers, as well
as the cycles and stages of services in which the organization has a close interrelationship with them. In
these stages, it is critical to assess the quality of services provided by suppliers.
Chapter 11
Analyzing Requirements and Approaches for Sourcing Software Based Services ............................ 195
G.R. Gangadharan, Novay, The Netherlands
Erwin Fielt, Queensland University of Technology, Australia
The sourcing requirements are identified for software based services (SBS) and associate the key char-
acteristics of SBS (with the sourcing requirements introduced). Furthermore, the sourcing of SBS is
investigated with the related works in the field of classical procurement, business process outsourcing,
and information systems sourcing. Based on the analysis, it is concluded that the direct adoption of these
approaches for SBS is not feasible and new approaches are required for sourcing SBS.
Chapter 12
Supplier Relationship Management in Health Care............................................................................ 206
Tobias Mettler, University of St. Gallen, Switzerland & SAP Research St. Gallen, Switzerland
Peter Rohner, University of St. Gallen, Switzerland
In this chapter the current findings are adapted on supplier relationship management (SRM) to the health
care context. On the basis of a case study a future scenario is developed for drugs supply management
and discusses potential performance and quality improvements.
Section 5
Service Management in Industries
Chapter 13
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports......................... 230
Joyce M.W Low, National University of Singapore, Singapore
Loon Ching Tang, National University of Singapore, Singapore
Xue-Ming Yuan, Singapore Institute of Manufacturing Technology, Singapore
Findings from this chapter show that while conducive economic conditions continue to play a critical
role in stimulating demand for cargo service at the airports, the importance of physical architecture has
also dramatically risen relative to human factors. Particularly, adequate provisions and utilizations of
physical facilities for landside operations appear to be a more significant driving force for demand of
an airport’s cargo service compared to those of airside operations. Despite the strong emphasis on swift
and reliable services, cost savings are found to have regained their importance in the recent years.
Chapter 14
Lifecycle Management of SLAs for Service Enterprises ................................................................... 251
Yang Li, Applications & Services, Research & Technology, British Telecom, UK
Service level agreement (SLA) is becoming an increasingly sought-after topic in recent years, as complex
logistics and service chains span across geographical boundaries in the lights of globalization and new
technological developments. This chapter introduces the state of the art of the lifecycle management of
SLA for service enterprises, which covers stages of terms optimization, contract drafting and compliance
tracking. In particular, the deficiencies are identified in the area of term optimization and outline several
R&D tracks that would lead to the development of industry-strength SLA optimization capabilities.
Chapter 15
Cyber Transportation Logistics: Architecting a Global Value-Chain for Services ............................. 272
Yupo Chan, University of Arkansas at Little Rock, USA
Jaouad Boukachour, School of Logistics, France
Chia-Chu Chiang, University of Arkansas at Little Rock, USA
Madan Mohan Dey, University of Arkansas at Pine Bluff, USA
Charles-Henri Fredouet, School of Logistics, France
Hing-Po Lo, City University of Hong Kong, China
Farhad Moeeni, Arkansas State University, USA
Albert K. Toh, University of Arkansas at Pine Bluff, USA
In today’s global economy, products and services are provided across international borders. While the
big companies have the ICTT resources to source globally at will, small and medium enterprises (SME)
are much less prepared to do so, resulting in a large competitive disadvantage. By contrasting SMEs
with their more successful “big brothers,” the salient ICTT features are highlighted in system architec-
ture as a checklist for any assistance that might be rendered to SMEs and other entities in overcoming
their competitive impediment. These findings are the result of numerous international workshops and
conferences held in Hong Kong and in Arkansas in the headquarters of Wal-Mart.
Section 6
Industry Service Models, Profession Development and Outlook
Chapter 16
Perceived Risk Management: Applying the TEID Model to the Traveler Service Chain .................. 299
Magali Dubosson, Haute Ecole de Gestion de Geneve (HEG), Switzerland
Emmanuel Fragnière, Haute Ecole de Gestion de Geneve (HEG), Switzerland & University
of Bath, Switzerland
This chapter holds the potential to contribute to extending an understanding and management capacity
of customer-perceived risks of knowledge-based services. It brings into play a new framework and new
risk management process. It also helps with formalizing and making tangible customer added-value.
Chapter 17
Prediction Reliability of Container Terminal Simulation Models: A Before and After Study ........... 315
Armando Carteni, University of Salerno, Italy
In this chapter attention is focused on the container terminal optimization problem, given that today
most international cargo is transported through seaports and on containerized vessels. In this context,
in order to manage a container terminal it is sometimes necessary to develop a Decision Support Sys-
tem (DSS). This chapter investigated the prediction reliability of container terminal simulation models
(DSS), through a before and after analysis, taking advantage of some significant investment made by
the Salerno Container Terminal (Italy) between 2003 and 2008.
Chapter 18
New Profession Development: The Case for the Business Process Engineer .................................... 336
Ying Tat Leung, IBM Almaden Research Center, USA
Nathan S. Caswell, Janus Consulting, USA
Manjunath Kamath, Oklahoma State University, USA
This chapter argues that an obstacle to business process (re)engineering is the lack of a business process
engineer role with an associated professional education, tools, and community. There is an urgent need
for a professional business process engineer. In the chapter, it is discussed the skills required of this
profession and a first course offered at a university on this subject is briefly described.
Chapter 19
Logistics Services in the 21st Century: Supply Chain Integration and Service Architecture ............. 359
Marcus Thiell, The Universidad de los Andes, Columbia
Sergio Hernandez, The Universidad de los Andes, Columbia
The dynamics of change and the path-dependent evolution of resources and capabilities are central con-
cerns of contemporary strategic management. Companies tend to concentrate scares resources into their
core competences. Opportunity, speed, product choices and availability are intangibles that customer
value, some times more than the price.
Foreword
“Service Science and Logistics Informatics: Innovative Perspectives” - the title of this book combines
the three major challenges in modern logistics and supply chain management; Services, informatics and
innovation. These enablers influence mainly the success of business logistics both on a regional level as
well as on an international level. They have to be designed and operated having in mind that world trade
flows are interconnected and modifiable. Logistics has to ensure distributed production in a dynamic
environment on a regional and on a global scale. In line with this, especially the service sector has been
playing an increasingly important role in world economy. New businesses, new distributions of tasks and
new value added services in international supply chain networks have occurred and will occur in future.
Moreover, new innovative control philosophies for logistics operations based on the realization of IT based
autonomous decentralized cooperating systems will improve the logistics efficiency in the next years.
These developments are confronted with present and future challenges on climate change as well as on
international security aspects. Moreover a sustainable trade off between business and living, production
and logistics has to be found. The quality of the design and sustainable operation of these relations, and by
this, of the innovative design and management of services, can be supported by knowledge management
between decision makers as well as common learning.
This book provides updated materials disclosing innovative findings for applied research and develop-
ment in the interdisciplinary fields between service science and logistics informatics. It covers chapters
entitled innovation strategies, service innovation, services sourcing and industry service models. By this, it
aims to provide researchers, practitioners, and academicians with insight into selected yet important topics
relevant to logistics and supply chain industries. It provides both business and IT professionals a reference
for practices and guidelines to service innovation in logistics and supply chain management. As a first of
its kind, this book addresses latest applied service science research and industry practices on emerging
enabling technologies including RFID, service innovations in logistics and supply chain management,
and the transformations of a more efficient economy. The book, built on an excellent portfolio of accepted
chapters, including the observations and reports on the world’s biggest retailers, world’s busiest airports,
and world’s most dynamic regions, to introduce service innovation in modernizing logistics and supply
chain management, serve as a prestigious reference to disseminate the state of the art research, develop-
ment, and advances of service innovation in logistics and supply chain management.
Hans-Dietrich Haasis
Institute of Shipping Economics and Logistics, Germany
xvi
Hans-Dietrich Haasis studied industrial engineering. He graduated in 1987 and promoted in 1993 to professor at the University
of Karlsruhe. Since 1994 he is full professor for Business Administration, Production Management and Industrial Engineering
at the University of Bremen. From July 1998 until 2001 he was dean of the department of economics. Moreover, since 2001
he is director of the ISL - Institute of Shipping Economics and Logistics, Bremen. Professor Haasis is author and co-author
as well as editor and co-editor of 15 monographs and proceedings. In addition, he has published more than 50 contributions
in scientific journals as well as proceedings and collections. He is amongst others member of the Council of Supply Chain
Management Professionals, as well as member of the Editorial Board of „Logistics Research“, and member of the Editorial
Review Board of the „International Journal of Operations and Quantitative Management“ and the “International Journal of
Applied Logistics”.
xvii
Foreword
As world economy gets increasingly integrated, logistics and supply chain management, through the use
of advanced information and service technologies, become critically important. This requirement entails
tight alignment of business strategy and judicious use of advanced information technologies. It also ne-
cessitates infrastructures for streamlining front-end and back-end management and business processes,
and resolution of emerging global integration and inter-operability issues. Logistics and SCM services
must also address critical needs for a variety of industries in the entire supply chain from manufacturing
sites to the retail users everywhere.
The recent emergence of enabling technologies including RFID and other advanced technologies
have further aroused interests in people to look into innovative ways to reengineer traditional services
in logistics and supply chain management. This book comes at just the right time, providing latest in-
novative findings for applied research and development in the interdisciplinary fields between service
science and logistics informatics. It is a must read for researchers, practitioners, and academicians who
are looking for insights in topics relevant to logistics and supply chain industries.
This book is also essential for anyone who desires for references for practices and guidelines to ser-
vice innovations in logistics and supply chain management. It addresses latest applied service science
research and industry practices on emerging enabling technologies to enhance competitiveness towards
an efficient and sustainable knowledge-driven economy.
The new interdisciplinary field of service science and logistics informatics yet has a lot more to
be discovered. This book also serves as a useful reference for practical applications with coverage on
hotspot observations, reports on world biggest retailers and busiest airports. It sure will arouse people’s
interests and serves as an excellent basis for the development of this new interdisciplinary field of service
science and logistics informatics.
Prof Tan is the Chief Executive Officer of the Hong Kong R&D Center for Logistics and Supply Chain Management Enabling
Technologies (LSCM R&D Center). It has the mission to conduct research and develop relevant technical solutions to serve
the industries in Hong Kong and the Pearl River Delta region. He is also the founding Director of the E-Business Technology
Institute (ETI) of The University of Hong Kong. Current professional interest of Prof Tan concerns mostly with the research
and technology transfer of practical solutions in areas such as Logistics and Supply Chain Management, RFID and Wireless
Applications, Service Oriented Application Platforms and Internet Infrastructures that are relevant to the Greater China re-
gion. Prof Tan serves as Adjunct Professor at Shanghai Jiaotong University, Chongqing University, China Central University
of Science and Technology, University of Electronic Science and Technology of China, South China University of Science and
Technology, and Harbin Institute of Science and Technology, Guest Professor at Zhejiang University, and holds the positions
of Visiting IBM Chair Professorship at the Dept. of Computer Science and the School of Business at the University of Hong
Kong. Prof Tan is a Fellow of the Association for Computing Machinery (ACM) and the Hong Kong Academy of Engineering
Sciences. He received the BSEE degree from Seattle University in 1963 and his Doctor of Engineering Science degree from
Columbia University, New York, in 1969.
xviii
Preface
IntroductIon
Recent technology advance in service science and logistics informatics has brought major development
boost to service and logistics service industries. It enables electronic means of logistics service opera-
tions, penetrating various value chains of logistics services. The service science view has been changing
participants’ behavior in logistics service value chain, making the logistics service and operation more
efficient, improving service experiences. With service innovation in the logistics industry continuously
increasing, more and more efforts have been directed to value add e-means (i.e. IT means for innovation)
for logistics services, With new e-means development, changes have been evident and reflected on the
presentation and processes of logistics information, operations, and services.
Today’s logistics industry also benefits from innovations in social community development. A logistics
service community would emphasize on the value of knowledge exchange among locally dispersed
community members. In such a community, logistics objects are identified, tracked, and augmented with
digital information. However, traditional approaches for recognizing these objects typically rely on either
complex pattern recognition techniques or bar code type technologies. Radio Frequency Identification
(RFID) technology provides an unobtrusive method of sensing the presence of and identifying tagged
logistics objects. With the development of wireless positioning technologies, the position of tagged ob-
jects could be determined as well. This interconnection among logistics objects with identification and
positioning would supply better quality of information, thus enhance logistics information visibility.
When a wide variety of such sensors are becoming increasingly cheaper, their deployment is becom-
ing increasingly wider. These novel technologies have promised better logistics information visibility
for logistics participants. To benefit from enhanced information visibility, logistics information could
be used and analyzed to help identify similar logistics service patterns for participants to use. Further,
the unique identification provided by RFID tagging enables convenient means to make the service ex-
perience better.
With the proliferation of Service science, RFID and other sensing technology, logistics industry
would start considering to use these innovative technologies as feasible and strategic business solutions
to integrate logistics applications for business processes within the company and across with business
partners, forming value chains and communities. In order for the logistics service community to be suc-
cessful, there are mechanisms required that fit naturally with the way on how the logistics business is
conducted. The logistics service community facilitates the packaging of related logistics information,
xix
product and service offerings for logistics operations to meet different service needs. It can potentially
promote high quality of logistics services and products for service provisioning. It provides a platform
of resource visibility and traceability for logistics services implementations, publication, discovery, and
consumption. The community is an ideal platform for service innovation to support sharing, access, and
managing diverse logistics resources.
Logistics service community has shown potentials in developing a better eco-system for service in-
novation in logistics industry. Many case studies have been preformed to reveal technical, business.
However, more efforts are needed to drive innovation and adoption to enable a more customer friendly
and focused logistics services.
There exists a major gap between the physical and electronic worlds. Thus, there demands technolo-
gies to collect data and establish connections between them. Although RFID is one of such promising
technologies, there are still many issues.
In the value chain of logistics, diversified population will have various needs. Although RFID would
be able to gather and present data for enabling insight generation, there still demands to help participants
understand the technology and address their data privacy concerns.
Relevant information to an individual may vary widely under different contexts. Many activities on
pervasive information systems focusing on context-aware delivery of application-specific information
are only able to operate within narrow application domains and cannot be generalized to handle other
heterogeneous types of information. Techniques are needed to extend locales to generalize to support
more flexible grouping and broader applications for those location-based services.
Service experience may encounter breakdowns due to functional failures, missing feedback, and
inconsistent interaction models. RFID’s promise of better information visibility and unique object
identification would help establish better information feedback and experience reinforcement. However,
technologies still need to help include capacities to enhance service systems to adapt the services to the
user’s behavior.
The interdisciplinary field of service science and logistics informatics yet has a lot more to be discovered.
Until now, in the market, it is lack of valuable hotspot observations and reports for the interdisciplin-
ary field. Strong demand is there for latest materials disclosing innovative findings for applied research
and development in this field between service science and logistics informatics. Those materials would
become more valuable if they are experiences and lessons learned on the world biggest retailers, world
busiest airports, and world most dynamic regions. World wide researchers, practitioners, and academi-
cians are seeking to focus their attention into the service sector for insights to develop service science
discipline. A number of selected yet important topics relevant to logistics and supply chain industries
would be of good importance towards those needs.
This book, in which eighteen chapters are selected, is constructed into six sections. It includes en-
abling technologies, e.g. RFID and other advanced technologies, which have further aroused interests
in people to look into innovative ways to reengineer traditional services in logistics and supply chain
management. It also includes reports on innovation strategies and mechanisms. Further it includes service
xx
innovations in logistics and supply chain management. It also addresses latest applied service science
research and industry practices and reports industry experiences in the adoption of the developed and
emerging theories and technologies to enhance competitiveness.
Section 1 has two chapters, dedicated for innovation strategies and mechanisms. Chapter 1 reports
observations and findings on “Innovative Strategies for Logistics Process”. In this chapter, innovative
strategies for logistics processes that can be used practically in business environment are mentioned. For
each innovative strategy title, tools that can be used to innovate operations are presented. By innovat-
ing logistics processes, logistics providers can fulfill customer needs rapidly and increase their profit
because of having competitive advantage. Chapter 2 reports observations and findings on “Research on
the Innovation Mechanism and Model of Logistics Enterprise: a Chinese Perspective”. A real case is
selected for Shenzhen China Overseas Logistics Co. LTD (COL) as the empirical objects to analyze its
character of the technology and non-technology innovation, and summarize its inner and outer driving
force on promoting the service innovation. Thereafter, the typical service innovative model based on
innovative driving force has been discussed.
Section 2 has three chapters, dedicated for experiences in logistics and service innovation. Chapter 3
reports observations on “Managing Customer-Centric Information: The challenges of Information and
Communication Technology (ICT) Deployment in Service Environments”. This chapter reviews the
difficulties inherent in using ICTs to manage customer-related information, and identifies the particular
challenges for customer-centric deployment of ICTs. It provides a model of different levels of customer
centric information use in organizations which helps understand how companies can become more cus-
tomer centric in their information use. It reviews implications for future research in this emerging area
and concludes that the challenges of ICT deployment and use must be addressed with an uncompromising
focus on customer value as the central principle of both ICT design and deployment, and of information
management in service organizations. Chapter 4 reports observations on “Impact of Wireless Sensor
Network Technology on Service Innovation in Supply Chain Management”. This chapter provides an
overview about wireless sensor network technology (WSN), how this technology can be applied to mod-
ern industries and especially bring service innovation to supply chain management. An overview of the
history and potential applications of WSN is provided for the necessary background. The architecture,
topology, standards, and protocols of WSN are fundamentally important and thus introduced in details.
In a general sense, the impact of information technologies on supply chain management and service
innovation is then briefly discussed. After that, much emphasis is placed on the possibility, procedures,
and critical challenges of implementing WSN in supply chain management. In the end, two case studies
are provided to illustrate the application of WSN for service innovation in both cold chain management
and healthcare settings. Chapter 5 reports observations on “Application and Design of Surface Acoustic
Wave Based Radio Frequency Identification Tags”. It overviews a complementary technology to the
integrated circuit based radio frequency identification (RFID) - surface acoustic wave (SAW) based
RFID. The fundamental principle and applications of SAW RFID are presented. In order to guarantee
the encoding capacity and reliable reading range, the design criteria in coding scheme, tag design and a
time domain interrogated reader design are discussed in detail. As an example, a low-cost SAW RFID
system applied in poultry farming management is introduced.
Section 3 has four chapters, dedicated for new technology and techniques on logistics informatics
and information logistics. Chapter 6 reports observations on “Information Needs of Logistics Service
Providers”. This chapter studies is on logistics service providers (LSPs) that are representatives of typi-
cal Finnish supply chains. The purpose of the chapter is to point out the current level of information
sharing in supply chains focusing on the information needs of logistics companies, particularly from
the LSP’s point of view. It revealed that there is a lack of logistics information in the supply chain. The
xxi
information distribution should be intensified when aiming at achieving a more efficient supply chain.
Chapter 7 reports observations on “IT Audit for Information Logistics”. It is focused on how informa-
tion logistics in business organization is supported by standards and best practices of auditing. CobiT,
ITIL, ISO/IEC 27002, Val IT as well as the Sarbanes-Oxley Act and ITAF model are analyzed in the
aspect of information logistics. Chapter 8 reports observations on “Information and Communication
Technology in Logistics as a Comparative Advantage”. In a time, when the “economic crisis” is filling
the news, it may seem hard to even think about improvements in terms of research and development,
since “there are lacking funds even for the reproduction”. However, also the last economic “revolution”
was “born” in a crisis. Therefore it is sensible to look at the current situation as an opportunity for the
next economic revolution, bringing the economy a new cycle of development. This contribution is to
lay the foundation for an advanced-research technological platform for logistics applications networks.
Chapter 9 reports observations on “How to market OR/MS decision support”. The OR/MS decision
support is investigated from a new viewpoint of service. Firstly, based on the fact what is provided by
OR/MS decision support, it is shown that OR/MS decision support shares characteristics with service
and hence can be considered as a kind of service. Next, OR/MS decision support is analyzed from the
viewpoint of what are necessary for service of high quality. It turns out that there is surely a problem
with communication gap between decision makers and decision supporters. It is effective to utilize
“problem specification”, which is a decision-maker-friendly description of problems, as one approach
to bridge the communication gap.
Section 4 has three chapters, dedicated for a well developed yet important topic, i.e., service sourc-
ing and supplier management. Chapter 10 is on “A Multi-criteria Tool for Evaluating Performance of
Service Suppliers - The Case of Met-Mex Peñoles Supply Chain”. The quality of service is certainly
a complex topic that many companies, although interested in the subject, difficult to address. It is well
known that the main reason is due to the intangibility of the service, perishable and heterogeneous. This
problem could be helped through a user-friendly tool. It is important to define and detect both internal
and external suppliers, as well as the cycles and stages of services in which the organization has a close
interrelationship with them. In these stages, it is critical to assess the quality of services provided by
suppliers. Chapter 11 is on “Analyzing Requirements and Approaches for Sourcing Software Based Ser-
vices”. The sourcing requirements are identified for software based services (SBS) and associate the key
characteristics of SBS (with the sourcing requirements introduced). Furthermore, the sourcing of SBS is
investigated with the related works in the field of classical procurement, business process outsourcing,
and information systems sourcing. Based on the analysis, it is concluded that the direct adoption of these
approaches for SBS is not feasible and new approaches are required for sourcing SBS. Chapter 12 is on
“Supplier Relationship Management in Health Care”. The structural transformation of modern societies
(e.g. aging of population, mobility) as well as continuously increasing market dynamics (e.g. mergers,
technological advancement) induce health care organizations to reduce their costs while enhancing
service delivery at the same time. However, as the pressure to innovate will increase extensively in the
next years, similar developments are becoming relevant for the health care supply chain, too. In this
chapter the current findings are adapted on supplier relationship management (SRM) to the health care
context. On the basis of a case study a future scenario is developed for drugs supply management and
discusses potential performance and quality improvements.
Section 5 has three chapters, dedicated for experiences on service management in industries. Chapter
13 reports observations on “Cargo Service Dynamics and Service-Oriented Architecture in East Asian
Airports”. Findings from this chapter show that while conducive economic conditions continue to play a
critical role in stimulating demand for cargo service at the airports, the importance of physical architecture
has also dramatically risen relative to human factors. Particularly, adequate provisions and utilizations
xxii
of physical facilities for landside operations appear to be a more significant driving force for demand
of an airport’s cargo service compared to those of airside operations. Despite the strong emphasis on
swift and reliable services, cost savings are found to have regained their importance in the recent years.
Chapter 14 reports observations on “Lifecycle Management of SLAs for Service Enterprises”. Service
level agreement (SLA) is becoming an increasingly sought-after topic in recent years, as complex lo-
gistics and service chains span across geographical boundaries in the lights of globalization and new
technological developments. This chapter introduces the state of the art of the lifecycle management of
SLA for service enterprises, which covers stages of terms optimization, contract drafting and compliance
tracking. In particular, the deficiencies are identified in the area of term optimization and outline several
R&D tracks that would lead to the development of industry-strength SLA optimization capabilities. An
initial version of a SLA optimization toolset coded-named SLA-OASIS is reported, in the context of a
telecom service, to illustrate such a concept. Chapter 15 reports observations on “Cyber Transportation
Logistics: Architecting a Global Value-Chain for Services”. In today’s global economy, products and
services are provided across international borders. The sourcing of these products and services becomes
an integral part of international businesses. Information, communication and transportation technolo-
gies (ICTT) have made this job significantly more streamlined. However, there is an advantage that big
companies, such as Wal-Mart, have over small and medium size ones. While the big companies have the
ICTT resources to source globally at will, small and medium enterprises (SME) are much less prepared
to do so, resulting in a large competitive disadvantage. By contrasting SMEs with their more successful
“big brothers,” the salient ICTT features are highlighted in system architecture as a checklist for any
assistance that might be rendered to SMEs and other entities in overcoming their competitive impedi-
ment. These findings are the result of numerous international workshops and conferences held in Hong
Kong and in Arkansas in the headquarters of Wal-Mart.
Section 6 has four chapters, dedicated for industry service models, profession development and out-
look. Chapter 16 is on “Perceived Risk Management: Applying the TEID Model to the Traveler Service
Chain”. This chapter holds the potential to contribute to extending an understanding and management
capacity of customer-perceived risks of knowledge-based services. It brings into play a new framework
and new risk management process. It also helps with formalizing and making tangible customer added-
value. Chapter 17 is on “Prediction Reliability of Container Terminal Simulation Models: a before and
after Study”. In this chapter attention is focused on the container terminal optimization problem, given
that today most international cargo is transported through seaports and on containerized vessels. In this
context, in order to manage a container terminal it is sometimes necessary to develop a Decision Support
System (DSS). This chapter investigated the prediction reliability of container terminal simulation models
(DSS), through a before and after analysis, taking advantage of some significant investment made by the
Salerno Container Terminal (Italy) between 2003 and 2008. Chapter 18 is on “New Profession Devel-
opment: The Case for the Business Process Engineer”. This chapter argues that an obstacle to business
process (re)engineering is the lack of a business process engineer role with an associated professional
education, tools, and community. There is an urgent need for a professional business process engineer.
In the chapter, it is discussed the skills required of this profession and a first course offered at a univer-
sity on this subject is briefly described. Chapter 19 is on “Logistics Services in the 21st Century Supply
Chain Integration and Service Architecture”. The dynamics of change and the path-dependent evolution
of resources and capabilities are central concerns of contemporary strategic management. Companies
tend to concentrate scares resources into their core competences. Opportunity, speed, product choices
and availability are intangibles that customer value, some times more than the price. This chapter pres-
ents general concepts behind the supply chain and logistics industry, as well as a proposal of the general
components of the service and organizational arrangements for logistics service providers depending on
the complexity of the requirements of the company that hires the service provider.
xxiii
Interested in continuing your reading? Bear the following, which is summarized to differentiate with
others, in mind while you are reading.
As a first of a kind, this book addresses latest applied service science research and industry practices
on emerging enabling technologies including RFID, service innovations in logistics and supply chain
management, and the transformations of a more efficient economy. It helps the development and advances
of this new interdisciplinary field of service science and logistics informatics.
This book, built on an excellent portfolio of accepted chapters, including contributions from three
major continentals including Asia, Europe, North/South America, on world biggest retailers, world busiest
airports, and world most dynamic regions, to introduce service innovation in modernizing logistics and
supply chain management, strives to serve as a prestigious reference to disseminate the state of the art
research, development, and advances of service innovation in logistics and supply chain management.
This book helps steer the attention of service innovation exploration in the right directions for logistics
and supply chain management. It targets both business and IT professionals for practices and guidelines
to service innovation in logistics and supply chain management.
This book is also resulted from a customer focused innovation approach. A story line of this book is set
as follows to structure the book, forming a good index for different reading styles, to suite your need.
Chapter 1
Innovative Strategies for
Logistics Processes
Bikem Türkeli
Marmara University, Turkey
Alp Ariburnu
Marmara University, Turkey
Özalp Vayvay
Marmara University, Turkey
aBStract
In a time of rapid revolutionary change, today organizations must innovate in ways that allow them to
take advantage of change. Competitive business environments force companies to respond to all changes
in the market. This response to that change brings innovation in processes. As a basis of all competitive
advantages, innovation should be continuous and the only way to maintain this is having the right in-
novation strategy. In this study innovative strategies for logistics processes, which can be used practi-
cally in business environments, are mentioned. For each innovative strategy title tools that can be used
to innovate operations are presented. By innovating logistics processes logistics providers can fulfill
customer needs rapidly and increase their profit because of having a competitive advantage.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Innovative Strategies for Logistics Processes
2
Innovative Strategies for Logistics Processes
ply chain’s visibility for inter-continental business • Competition: The need to differentiate
functionality. It must use standard document and one’s product or service from the competi-
exchange protocol and provide interoperability. tion often results in process, product, pack-
Innovation in the logistics sector is created aging and/or supply chain innovations.
around new or improved: • Research and development: A stable and
well-funded base for building knowledge
• Capabilities and processes: This includes and capabilities, which in turn results in the
improvements in managerial systems, development of new, more advanced and
skill development of logistics specialists more profitable services and products. The
and supply chain managers as well as the ability of manufacturers to access research
adoption of information technology based and technological developments is crucial
systems. to driving innovation, as is the dissemina-
• Products and services: Innovation in this tion of enabling technologies that support
sector ranges from innovations relating production flexibility.
to hardware, such as the design of rolling • Enabling and platform technologies: Major
stock and trucks, to the operation of the advances in enabling and platform tech-
transporting mechanism, whether it is a nologies have opened up opportunities for
train, truck, plane or ship, to the methods new products and services, and operational
and practices used for transporting goods. efficiencies.
• Major infrastructure innovation: This in-
cludes involving in a number of initiatives Market Related Drivers
to improve infrastructure and increase ca-
pacity. These in turn will promote further • Major projects: The awarding of major
innovation in the sector. projects to companies attracts new invest-
• Supply-chain innovation: The rise of sup- ment and drives innovation by suppliers
ply chains has been an innovation in itself, and contractors.
resulting in freight flowing seamlessly • Investment attraction: Attracting global
from collecting raw material to delivering companies that bring new technologies and
goods ready for consumption. (New South innovative labor skills.
Wales Government, Department of State • Globalization: Results in increased levels
and Regional Development) of competition which aims for best prac-
tice and brings foreign business to world-
the drivers of Innovation wide markets. All of these elements have a
in logistics Sector flow-through effect on the development of
systems, practices and products.
Profit Related Drivers • Industry trends: Trends which occur in a
local market or globally, have a significant
• Customer demands: Meeting consumer impact on how business is carried out and
expectations are common drivers of in- how businesses plan for the future.
novation. Companies increasingly need
to respond to consumer buying decisions Legal Drivers
influenced by such factors as fashion, con-
venience, indulgence, functionality and • Regulations: These drivers can take the
conscientious consumerism. form of environmental, security and safety
3
Innovative Strategies for Logistics Processes
regulations, amongst others. For example, suppliers, partners, and competitors in dif-
across sectors, the regulations associated ferent parts of the world, requires compa-
with occupational health and safety issues nies to take a strategic approach to their in-
have led to innovations which have im- novation activities to provide focus within
proved safety in workplaces. (New South an ever-expanding set of opportunities and
Wales Government, Department of State threats.
and Regional Development) • Organizational structures and innovation
processes that firms adopt to encourage
InnovatIve StrategIeS technological innovation need to relate to
the corporate strategy pursued by the firm,
An innovation strategy guides decisions on how and vice versa; for example, R & D can be
resources are to be used to meet a firm’s objectives organized according to whether the firm
for innovation and thereby deliver value and build aims to support an innovation leader or fol-
competitive advantage. Its crafting is supported lower position.
by a number of innovative capabilities that steer • Unless firms can articulate their long-term
the configuration and reconfiguration of a firm’s strategic aims for innovation, it is difficult
resources. It entails judgment about which kinds for them to communicate with and benefit
of innovation processes are most appropriate for from public-sector science and technol-
the firm’s circumstances and ambitions. An in- ogy policies in areas such as basic science,
novation strategy identifies the technologies and regulation, and standards creation. They
markets the firm should best develop and exploit are also less likely to be able to build long-
to create and capture value. It does so within term technological collaborations with
the limits of the resources available to the firm partners or to find patient investors
to support current and future innovation efforts • A firm that identifies innovation as a strate-
and its evolving corporate strategy, organization, gic activity is more likely to attract creative
and culture. workers in search of exciting opportunities
The reason why innovation is a strategic man- in the ‘war over talent’. (Dodgson et al.,
agement issue is because it is intimately linked to 2008)
the capacity of the firm to deliver value:
An innovation strategy is only good for a finite
• Creating and appropriating returns from amount of time. One of the worst mistakes an or-
innovations is a key source of competitive ganization can make is to assume that because an
advantage for a firm. innovation strategy was successful it will always
• Complex, risky, and expensive activities, be successful. The environment shifts, customers’
such as R & D, product and services inno- needs change, competition gets smart, technolo-
vation design, operations, networking, and gies improve, and the organization evolves itself.
collaboration, can hamper a firm’s compet- (Prestwood and Schumann, 1994)
itive position and may result in piecemeal,
short-term focused, and potentially con-
flicting outcomes unless they are guided InnovatIve StrategIeS for
by choices that build synergies and grow logIStIcS ProceSSeS
expertise cumulatively.
• Globalization of technology and mar- Companies’ efforts to innovate logistical processes
kets, with many potential new customers, involve major uses of information technology and
4
Innovative Strategies for Logistics Processes
organizational change enablers. These innovations • The use of structured, formatted messages
in logistical processes are; based upon internationally agreed stan-
dards (thus enabling messages to be trans-
• Electronic data interchange and payment lated, interpreted and checked for compli-
systems ance to a standard set of rules).
• Configuration systems
• Warehousing technologies and conditions The term EDI therefore does not refer to:
• Third-party shipment (transportation) and
location tracking systems • Electronic mail
• Close partnerships with customers and • File transfer
suppliers (Davenport, 1993). • Remote data entry
5
Innovative Strategies for Logistics Processes
contract parties such as external IT companies and data. EDI is very important to logistics companies,
the different characteristics among the participat- whose daily work frequently involves a high share
ing companies. of repetitious business processes. According to
Typical information transmitted by electronic the automation of entire business processes, costs
data interchange includes: can be significantly reduced. For instance, when
retail inventories fall below a minimum level,
• Reporting and planning data such as point- orders can be automatically transmitted to the
of-sale information warehouse data, fore- supplier’s production system. The information is
casts, advertising measures and new prod- sent from there to the logistics service provider
uct introductions who organizes the delivery. This eliminates the
• Transaction data such as orders, shipping need for telephone calls, faxes and e-mails.
notes and invoices Swatman and Swatman (1991) states that
EDI’s direct impacts include labor-savings in
The Benefits of EDI the areas of data transcription, controls, and
EDI and other similar technologies save company error investigation and correction; and fewer
money by providing alternative to or replacing in- delays in data-handling. Benefits of Electronic
formation flows that require a great deal of human data integration are improved internal operations
interaction and materials such as paper documents, from a reduction in time, better responsiveness to
meetings, faxes, etc. Even when paper documents customers, improved trading partner relationships
are maintained in parallel with EDI exchange, e.g. and increased ability to compete, both domesti-
printed shipping manifests, electronic exchange cally and internationally.
and the use of data from that exchange reduces the
handling costs of sorting, distributing, organizing, The Drawbacks of EDI
and searching paper documents. EDI and similar Significant costs are associated with implement-
technologies allow a company to take advantage ing and operating EDI systems. This is because
of the benefits of storing and manipulating data solutions available in the market must be adjusted
electronically without the cost of manual entry. to a company’s own needs and employees must
Another advantage of EDI is reduced errors, such be trained. In addition, a pilot phase or an initial
as shipping and billing errors. One very important parallel operation is frequently necessary. The
advantage of EDI over paper documents is the result is that small and mid-sized companies
speed in which the trading partner receives and in particular avoid EDI and rely on traditional
incorporates the information into their system thus forms of data transmission instead. Furthermore,
greatly reducing cycle times. For this reason, EDI processes in a company must undergo significant
can be an important component of just-in-time changes before EDI can be applied. For instance,
production systems. a company may normally receive its goods before
Data interchange with EDI accelerates reaction an invoice is sent in the mail. But if EDI were used,
times to customer requests. In addition, electronic the invoice would arrive before the goods were
data transmission creates the possibility of making delivered. Accordingly, processes must be adjusted
the latest point-of-sale data from the entire supply in such a way that invoices can be processed by
chain available at any time. This increases planning the company before the goods have arrived.
and disposition security. Moreover, eliminating
manual data entry creates very extensive cost- EDI and the Internet
cutting potential, e.g., by reducing errors and In DHL Logbook, EDI and the Internet are ex-
avoiding changes of media as well as multi-entered pressed. According to DHL logbook, EDI has been
6
Innovative Strategies for Logistics Processes
available in this form for several decades. The • Prepaid cash-like payment systems like
leading data standard at the moment is EDIFACT. Mondex, where a certain amount of money
It was first developed as a European standard in is taken from the payer before purchases
the middle of the 1980s and was then adapted to are made. The money can be used for pay-
American regulations. Since then, EDIFACT has ments later.
become the central standard for communications • Pay-now payment systems like EPS, where
between applications systems particularly in the payer’s account is debited at the time of
Europe as well as increasingly in other regions. payment.
One exception is the banking and financial sec- • Pay-later payment systems like Visa,
tor. With the help of the Internet, the efficiency where the payee’s bank account is credited
of EDI systems has been increased further. For the amount of sale before the payer actu-
instance, the data format standard XML facilitates ally pays.
the display of hierarchically structured files in the • Cheque-like payment system like
form of text files. “XML” stands for “eXtensible E-checking, where a payment is done by
markup language.” As a result, graphics in a text sending electronic forms from payer to
format can be exchanged between different ap- payee.
plications and processed further. This enables all
sorts of business transactions to be displayed. recent trends in
The Internet offers an open, fast, widespread and electronic Payments
low-cost environment for managing data traffic,
particularly in the areas of transport, retail and Card Payments
administration. In this way, even smaller com-
panies that want to avoid the high investments Automated Teller Machine (ATM)
associated with the development of a “classic” An automated teller machine (ATM) is a computer-
EDI can profit from the benefits of electronic data ized telecommunications device that provides the
traffic. One shortcoming of the so-called “Web- customers of a financial institution with access to
EDI” with XML can be the need for encryption financial transactions in a public space without
mechanisms. the need for a human clerk or bank teller. On most
modern ATMs, the customer is identified by in-
Electronic Payment Systems serting a plastic ATM card with a magnetic stripe
or a plastic smartcard with a chip that contains a
Electronic payment systems are becoming cen- unique card number and some security informa-
tral to on-line business transactions nowadays as tion, such as an expiration date or CVC (CVV).
companies look for various methods to serve cus- Security is provided by the customer entering a
tomers faster and more cost effectively. Electronic personal identification number (PIN). Using an
commerce brings a wide range of new worldwide ATM, customers can access their bank accounts
business opportunities. There is no doubt that in order to make cash withdrawals (or credit card
electronic payment systems are becoming more cash advances) and check their account balances
and more common and will play an important role as well as purchasing mobile cell phone prepaid
in the business world. credit.
According to Electronic Payment Systems Manufactures have demonstrated and have
Handbook of Cyberspace Center, there are four deployed several different technologies on ATMs
types of electronic payment systems: that have not yet reached worldwide acceptance,
such as:
7
Innovative Strategies for Logistics Processes
• Biometrics, where authorization of trans- of cash, safekeeping and security, deposits of cur-
actions is based on the scanning of a cus- rency and other services related to the handling
tomer’s fingerprint, iris, face, etc. of cash provided by financial institutions. Many
• Cheque/Cash Acceptance, where the ATM firms, particularly those involved in handling large
accepts and recognizes cheques and/or cur- amounts of coinage and bank notes, are finding the
rency without using envelopes. costs of handling cash to be increasingly onerous.
• Bar code scanning These costs include expenses related to point-of-
• On-demand printing of “items of value” sale transactions, accounting, theft, loss of cash,
(such as movie tickets, traveler’s cheques, safekeeping and security, deposits of currency
etc.) and other services related to the handling of cash
• Dispensing additional media (such as provided by financial institutions.
phone cards)
• Co-ordination of ATMs with mobile Electronic Funds Transfer at Point of Sale
phones (EFT/POS)
• Customer-specific advertising It is the automatic transfer of funds, using a debit
• Integration with non-banking equipment card at a retail point of sale, from a consumer’s
demand deposit account to the retailer’s account.
Electronic Purses/Wallets EFT-POS transactions pass through the retailer’s
In a general business sense, an electronic wallet back office computer and, if the retailer is part of
(or electronic purse) is a consumer device provid- a chain, may also pass through the data center of
ing some additional security compared to a mere the retailer on its way to the EFT processor.
credit card solution. An electronic wallet could According to Haefner, Web based point of sale
be as simple as an encrypted storage of credit (POS) is the best payment system. Its software
card information that saves consumers to re-enter installation is faster and easier. All software is
their credit card data manually each time they supported and maintained on the provider’s end.
make a payment. There is considerable variety Companies should have to pay less money for
of products and services, each called “electronic the system and IT. Because provider owns the
wallet” or “electronic purse” that turns up in the hardware and does everything, you need to do on
marketplace and in investors’ press conferences, IT. Web-based POS usually eliminates the task of
while the technical specifications and the life time polling. Whether the company have 1 store or 100
of these products and services are left unclear. An stores, up to the second information is available
electronic wallet is a consumer device which is at any time.
designed to store and manage electronic funds or Additionally, because it is web-based software,
electronic cash. In particular, an electronic wallet company can access sales numbers, customer
is used to download funds from a bank account, information, inventory and much more informa-
to store those funds inside the electronic wallet tion from any store. It allows improved inventory
and transfer deliberate amounts to other electronic management. In a multi-location environment,
wallets or point of sale terminals in order to make inventory costs can be significantly reduced
purchases. because real time tracking can prevent over or
Many firms, particularly those involved in han- under buying and it allows you to have access
dling large amounts of coinage and bank notes, are to on-hand, in-transit, and on-order items. This
finding the costs of handling cash to be increasingly instant access to information means that compa-
onerous. These costs include expenses related to nies are able to control inventories for all stores
point-of-sale transactions, accounting, theft, loss from one location and they can control them much
8
Innovative Strategies for Logistics Processes
9
Innovative Strategies for Logistics Processes
computer. For instance, personal computer can be users to move money a limited amount of money
used to view account balance, request transfers around the world.
between accounts, and pay bills electronically. Electronic Payment Systems Handbook of
Cyberspace Center states that factors such as
Online/Internet Payments the accelerating rate of change and complexity
The on-line payment systems are e-commerce in technology, globalization of markets, orga-
businesses allowing money transfers to be made nizational factors, and increasing demographic
only through the Internet. They function as a fast diversity, would drive the future of electronic
and secure electronic alternative to traditional commerce. New technologies would change the
methods as cheques and money orders. The sys- current electronic payment systems and would
tems perform payment processing not only for ultimately provide privacy and security, but not
online vendors, auction sites, and other corporate anonymity, which magnifies potential risks of
users but between their costumers, for which it electronic commerce.
charges a fee which is much less than the bank
wire transfer equivalent. configuration Systems
10
Innovative Strategies for Logistics Processes
needs, the higher is the uncertainty associated with to come back to the customer with a quotation.
the task of selling and delivering these products. Alternatively, organizations may create self-
The front-end of the organization, for example, contained tasks, meaning that they can reduce the
may have a difficult time estimating the feasibil- degree of division of labor and place the different
ity of a specific customer’s request. Likewise, the actors in charge of the sale and delivery of cus-
back-office may experience serious difficulties tomized products under the same organizational
envisaging technical solutions to comply with this unit. This is done, for instance, by having sales-
request. Customization, in other words, leads to men with strong technical background deal with
task uncertainty. customization, without the need to involve the
The decision of a company to offer customized technical office.
products leads, ceteris paribus, to an information More recently, companies have begun to de-
processing gap, i.e. the organization does not have sign configurable product families to reduce the
all the information it needs to perform its task at information processing requirements induced by
the desired performance level, be it time, cost, customization, de facto engaging in the organi-
or any other measure of performance. In the case zation design strategy known as environmental
of customization, the nature of the information management. This is because, for a configurable
processing gap can be thought of in terms of, for product family, product variants are generated by
example, the lack of information regarding the combining sets of predefined components, i.e. no
possibility and profitability of complying with a new components are designed to address the cus-
given customer request. tomers’ needs.1 Stated otherwise, addressing the
Traditionally, companies offering custom- market by means of a configurable product family
ized products have addressed such information means constraining the product offer of a company
processing gaps by using organization design within a pre-determined product space. Evidently,
principles, which either reduce the needed infor- relying on a predetermined product space means
mation processing capacity or increase the avail- drastically cutting uncertainty concerning the sale
able information processing capacity. Typically, and delivery of customized products.
the information processing capacity is increased By serving the market through a configurable
by establishing lateral relations. This means that product family, a company does not have to cus-
customization related problems are solved by tom-design its product variants. The design task
cutting across functional boundaries, such that in order acquisition is in this case substituted by
all the individuals and units possessing informa- a different task – the product configuration task.
tion relevant to address a customer problem work This task is one for which: (1) no new components
jointly towards a feasible solution. In practice, are designed during the configuration task; (2)
this means that often front-end and back-end of components are connected to other components
the company work together in order to sell and under a set of pre-defined compatibility con-
deliver customized solutions. straints; and (3) solutions (configurations) specify
On the other hand, companies have tried to not only the components in the configuration but
reduce the information processing requirement also how they are related.
needed to sell and deliver customized products. Companies that serve heterogeneous custom-
The simplest and easiest way to do this is to rely ers’ needs through configurable product families
on slack resources, i.e. to simply reduce the level can naturally take advantage of an additional
of performance. For example, an organization fac- organization design strategy to increase their in-
ing serious information processing constraints in formation processing capability, by establishing
the tendering process may allow itself more time formal information systems. Such systems would
11
Innovative Strategies for Logistics Processes
help closing the information processing gap by Warehouse management systems (WMS) have
providing problem-solving information to the also significantly gained in functionality and now
appropriate organizational entities. In practice, provide solutions to current challenges such as
these systems take the form of product selection downsizing inventory. Warehouse managers are
and configuration assistants (product catalogues, operating in a buyer’s market, with customers
e-catalogues, product configurators and users demanding quicker delivery with value-added
toolkits, etc.) (Salvador, Forza, & Claes, 2007). service. In addition, buying patterns have shifted;
orders are smaller and more frequent. New ware-
Warehousing technologies house management systems address these issues
and conditions and trim the supply chain. They are not only more
functional, but they can easily interface with other
A warehouse is typically viewed as a place to technologies. Many WMS applications enable
store inventory but the role of the warehouse is automation while working with both ordering
more properly viewed as a switching facility as and shipping systems and logistics routing pro-
contrasted to a storage facility. The design of a grammes. These capabilities ensure the smooth
warehouse management system should address flow of merchandise.
physical facility characteristics and product Even small warehouses can benefit from
movement. The warehousing technologies that IT improvements. Small operations can bring
are commonly used in logistics industry include partial automation to their facilities through
automated storage and retrieval system (AS/RS), emerging Internet-based services. Application
automatic sorting system, computer-aided picking service providers are driving this phenomenon.
system, and thermostat warehouse (Fagerberk, They let thousands of small warehouses execute
Movery, & Nelson, 2004). operations, which were previously not possible
Due to Naxtor Technologies discussing posi- without complicated and expensive warehousing
tive effects of IT on warehouse operations, many technologies.
of the new warehousing solutions mix the old Material handling solutions that are on the IT
and the new. The old is technologies such as edge include wireless technologies such as Palm
warehouse management systems, which have Pilots and Ethernet bridges that can connect several
been around for a while and the new is software locations to one network. In addition, robotics and
and information technology enhancements. In automated picking technologies are easier to use,
fact, these innovations are not only giving old more compact and more efficient.
technology new efficiencies, but they are also Automated pallet loaders now use driverless
tweaking direct-to-customer distribution and vehicles or embedded platforms that elevate be-
fulfillment activities. fore releasing loads inside a trailer. These robotic
Pick-to-light systems have been given the advancements significantly increase productivity
IT makeover. Newer versions of pick-to-light by eliminating unnecessary strolling.
systems are virtually touch-free. Previously in Voice or speech recognition is also gaining in
pick-to-light, the picker had to push a button when acknowledgment. Voice recognition frees both
he had finished the task. Now newer systems of hands of the worker, boosting his productivity.
this long-standing technology have sensors, which Workers no longer have to adjust vocal inflection
detect when the picker’s arm is in a pre-designated so that the programme can identify what is being
spot in the picking area. said. Instead, users give speech samples to the
12
Innovative Strategies for Logistics Processes
system to memorize. In fact, the new versions of showing a general idea of every awaiting operation
this technology can interpret a range of languages in the warehouse including all purchases, pending
and accents. receipting, pending picking, items nearing their
Speech recognition may even make warehouse minimum level of stock holding, current activity
radio frequency (RF) technology obsolete, assert of all users of warehouse management system
many material-handling experts. Radio frequency and to do list including replenishments of pick
may avoid becoming outmoded because of its locations.
own IT advancements. RF identification tags
have successfully tracked trailers, rail cars, marine Radio Frequency Identification (RFID)
containers and other costly items. Embedded or RFID is a Technology that allows a sensor (reader)
attached RFID tags contain data, which can be to read, from a distance, and without line of sight,
retrieved by low-wattage radio waves. This can a unique electronic product code (EPC) associated
be sent to a computer or saved on other digital with a tag. Applications of RFID are:
devices to be uploaded later. RFID will work
even without direct line of sight, and non-metallic • Supply Chain Management: Real time in-
objects such as trees will not obstruct radio wave ventory tracking
transmissions. • Retail: Active shelves monitor product
Data warehousing is another IT-driven ware- availability
housing solution. Data warehousing notes trends • Access control: Toll collection, credit
and what SKUs are selling over a period of time. cards, building access
Then utilizing trend analysis and statistical process • Airline luggage management: British air-
control, it makes recommendations about where ways implemented to reduce lost/mis-
merchandise should be placed in the warehouse. placed luggage (20 million bags a year)
Items in high demand are made more accessible • Medical: Implant patients with a tag that
while slower-moving ones are consigned to less- contains their medical history
explored places. • Pet identification: Implant RFID tag with
pet owner information
Warehouse Technologies
As indicated in Wilding and Delgado (2004),
RF when compared with other automatic identifica-
Radio Frequency, more commonly called “RF”, tion systems like barcodes, magnetic stripes or
refers to reading bar codes to capture data (when manual data entry, RFID offers many potential
picking in a warehouse, to the validation of benefits. Currently the cost of the technology
what is being picked vs. what should be picked). is a barrier but as implementation costs fall this
The use of RF increases picking accuracy, and will be less so. The use of RFID technology has
sometimes can increase productivity. Warehouse many applications in the industrial and warehouse
management system offered by Radio Frequency environment such as product handshaking, near
Barcode Systems is a potent solution for regular real time inventory control and condition moni-
warehouses and 3PL operators. toring.
The warehouse management system removes Developments in RFID technology continue
paperwork and streamlines operations by means to yield larger memory capacities, wider reading
of its user-friendly interface. Warehouse manage- ranges, and faster processing. Nonetheless, it is
ment system offered by Radio Frequency Barcode highly unlikely that the technology will ultimately
Systems assists the manager of the warehouse by replace barcodes, since the integrated circuitry
13
Innovative Strategies for Logistics Processes
14
Innovative Strategies for Logistics Processes
useful reports about the status of goods in the a benefit to the customer by reducing cus-
warehouse. Warehouse Management monitors tom interface development with increased
the progress of products through the warehouse. functionality. More popular SCE integra-
It involves the physical warehouse infrastructure, tion offerings are the Integration (Labor
tracking systems, and communication between Management), Slotting, Transportation
product stations. Management System (TMS), Yard
Management, Order Management,
Emerging Technologies Advance Planning and Scheduling (APS)
and Material Handling Integration.
As illustrated in Tompkins Associates, emerging
technologies in warehouse management systems third-Party Shipment and
are: location tracking Systems
• XML Communication: XML, which stands Third party shipment is shipping goods to cus-
for eXtensible Markup Language, is a com- tomer on company’s behalf. It provides savings
munications means where trading partners and takes workload from shoulder of logistics
can define and exchange information in a managers. Third-party firm’s profession allows
collaborative format. What XML brings to better delivery times and safer transportation.
the warehouse management systems tech- Tradenet Services mentioned the concept of
nology is the capability of integration and third party shipping, its advantages and disadvan-
exchange with other partners, suppliers or tages as follows:
customers’ systems as well as ERP or oth-
er planning systems through the Internet. Concept of Third Party Shipping
Combining this communication platform
with critical warehouse operations func- Decades ago, it was common practice for a manu-
tionality helps in driving inefficiencies and facturing or merchandising firm to receive orders,
integration costs down in the total supply process them, and then ship them to the recipient
chain synthesis. according to the terms of the agreement. However,
• Web Visibility: This technology allows in recent years, businesses have realized that man-
the users to access information such as re- aging and maintaining their own delivery vans and
ceipts status, shipment dates and inventory shipping departments are costly. Businesses need
status remotely through the Internet. This to repair and keep their delivery trucks in working
Web enabling capability is also allowing condition. They need to pay salaries to drivers and
several vendors to host their warehouse staff who are directly involved in delivering the
management systems without physically goods. They also need to buy insurance policies
implementing the software at a customer to cover for any loss or damage to your goods
site. This approach may lower the overall while they are in transit.
cost of ownership for some customers. As a result, many suppliers of raw materials and
• Supply Chain Execution (SCE) Integration: finished goods have been resorting to third party
Leading Warehouse Management System shipping arrangements in order to cut down their
vendors are integrating their warehouse overhead. They have discovered many advantages
management systems software to other SCE and benefits in using third party providers to handle
suites of products. This integration brings shipping and delivery on their behalf.
15
Innovative Strategies for Logistics Processes
16
Innovative Strategies for Logistics Processes
operations. Algorithms and mathematical meth- external collaboration. Moreover, they allocate
ods to develop strategies for network control and their scarce resources and time by selectively
optimization are used. In addition to technological managing the full range of relationships across
and systems issues, there are a variety of insti- the supplier portfolio.
tutional issues that must be carefully addressed. Ten principles of customer/supplier relations
The strategic vision for Intelligent Transportation are:
Systems, then, is as the integrator of transporta-
tion, communications and intermodalism on a • Customer and supplier are fully respon-
regional scale. sible for quality control.
• Customer and supplier should respect each
close Partnerships with other’s independence.
customers and Suppliers • Supplier is entitled to complete informa-
tion from the customer.
Partnering is a long-term commitment between • Non-adversarial contract between custom-
two or more organizations for the purpose of er and supplier is needed for quality, quan-
achieving specific business goals and objectives. tity, price, delivery method and payments.
The relationship is based upon trust, dedication to • Supplier should provide quality to meet
common goals and objectives. Benefits of partner- customers’ satisfaction.
ing include improved quality, increased efficiency, • Product quality evaluation methods should
lower cost, increased opportunity for innovation, be decided by the mutual consent of both
continuous improvement of products and services. the parties.
The three key elements of partnering are long-term • Amicable settlement of disputes between
commitment, trust and shared vision. customer and supplier should be estab-
People are key factors in partnering. Com- lished in the contract.
panies should build and develop relationships • Continuous information exchange im-
with them. Relationships between customer and proves the product or service quality.
supplier need to be collaborative, not necessarily • To maintain an amicable relationship,
contractual. It should be open and there should both the parties should do procurement,
be trust, win-win philosophy, and communication production, and inventory planning.
between them. Customers and suppliers should • Best interest of the end user should
be treated as partners in the activity. Therefore, be considered while doing business
they both should be focused on outcome and share transactions.
responsibilities.
Wagner and Boutellier (2002) states that be- Development of relationship includes,
cause companies can no longer possess all compe-
tencies themselves, strategic partnerships between • Inspection: The goal is to eliminate or au-
customers and suppliers are becoming more and tomate the inspection process. It has four
more essential. In fact, firms rely on strategic part- phases: 100% inspection, Sampling, Audit,
ners to achieve and sustain a competitive position. and Identity check.
Theory helps explain the choice between arm’s • Training: All personnel should receive
length and cooperative relationships, and practice quality awareness, problem solving, tech-
provides some valuable examples. Companies nical and safety training.
often lack strategic thinking and the necessary • Team approach: Customer/supplier teams
supplier management capabilities. Advanced are established in areas such as product de-
corporations continuously improve internal and sign, process design and quality system.
17
Innovative Strategies for Logistics Processes
18
Innovative Strategies for Logistics Processes
19
Innovative Strategies for Logistics Processes
Salvador, F., Forza, C., & Claes, B. (2007). Ef- Tradenet Services srl, (2008). A Closer Look at
fectiveness of the Product Configuration Task: Third Party Shipping Arrangements. Retrieved
Theory Formalization and Test, POMS 18th An- from http://www.blogsharp.com/news_9626.
nual Conference, Dallas, TX. html
Sussman, J. M. (2005). An Introduction to Wagner, S. M., & Boutellier, R. (2002, No-
Intelligent Transportation Systems, SPRING vember-December). Capabilities for managing
1.212, Lectures 2, 3. Retrieved from ocw.mit. a portfolio of supplier relationships . Business
edu/NR/rdonlyres/Civil-and-Environmental- Horizons, 45(6), 79–88. doi:10.1016/S0007-
Engineering/1-212JSpring-2005/5B253ABF- 6813(02)00263-X
EC98-4E53-BA43 4F78500628EA/0/lec3.pdf
Wilding, R., & Delgado, T. (2004). RFID – Ap-
Swatman, P. M. C., & Swatman, P. A. (1991, plications within the Supply Chain . Supply Chain
February). Electronic data interchange: orga- Practice, 6(2), 36–49.
nizational opportunity, not technical problem.
In Proceedings of the Conference of the DBIS
′91 – 2nd Australian Conference on Information
Systems and Database (pp. 290-307). University
of New South, Wales, Sydney. Tompkins As-
sociates Monograph Series, (n.d.). Warehouse
Management Systems Technologies, Transforming
Customer Satisfaction Through Better Inventory
Management. Retrieved from http://www.idii.
com/wp/tompkins_wms.pdf
20
21
Chapter 2
Research on the Innovation
Mechanism and Model of
Logistics Enterprise:
A Chinese Perspective
Zhang Mu
Jinan University, China
Li Wenli
Jinan University, China
Luo Jing
Jinan University, China
Ye Xiang
Jinan University, China
Ren Congying
Jinan University, China
Wu Chengjuan
Jinan University, China
aBStract
Logistics is a newly developed field in the service industry; it is growing rapidly in the world and is
regarded as the fundamental industry and artery in the national economy. The level of its development
is an essential measurement for judging a country’s modernization level and overall national strength. It
works as an accelerator in the economic development. As in the initial stage of transforming traditional
logistics service to modern logistics service in China, logistics enterprises have encountered difficulties
and problems including the imbalanced supply and demand for logistics service in the market, distem-
pered industrial structure, faultiness of serving process and lagging of logistics technology, since 2005.
Compared with the developed countries, there exists great gaps between the Chinese logistics enterprises
and the advanced level in the aspects of service concepts, service model, service content and service
techniques. So the authors analyze the innovation model integrated logistics, logistics technology and
DOI: 10.4018/978-1-61520-603-2.ch002
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Research on the Innovation Mechanism and Model of Logistics Enterprise
logistics network model, value-added service model, based on the service innovation driving force
theoretic framework. At last, the authors selected Shenzhen China Overseas Logistics Co. LTD (COL)
as the empirical objects to analyze its character of the technology and non-technology innovation, and
summarize its inner and outer driving force on promoting the service innovation. Thereafter, the typical
service innovative model based on innovative driving force has been discussed.
22
Research on the Innovation Mechanism and Model of Logistics Enterprise
revIeW of the reSearch service innovation was found and the importance
on SeIvIce InnovatIon and of service innovation from industry level perspec-
logIStIcS SeIvIce InnovatIon tive was realized. Lin and Wu (2003) introduced
the above international research outcomes in the
The main difference between service economy book of “Service Innovation”.
and traditional economy is that service economy From the perspective of research method, the
focuses more on the dynamic resources, such as researchers have applied the theory and method
process, knowledge and skill, and value creation is system developed in manufacturing industry to
regarded as a collaborative process involving both service innovation research after the concept of
service provider and customers. Some researchers service innovation was proposed and accepted in
call it as “service dominant logic”. The traditional 1980. The research results found that the innova-
economy, however, focuses more on product tion theory from manufacturing industry could not
manufacturing, emphasizes on static resource completely explain the innovation activities and
(such as natural resource) and take value creation mechanism. The typical representative research of
process as the process of transforming the resource this stage was named as “reverse product cycle”
to the product and delivering to the customers, proposed by Barras (1990) after his study of the
which is called “goods dominant logic”. typical service industries including financing and
Western academia started systematic research insurance industry etc.
about service innovation in 1980’s. Earlier research Thereafter, the scholars started to study innova-
on service innovation focused on micro-level of tion and the related issues from the perspective of
enterprise with emphasizing service innovation service characteristics, which was called “service
concept, types and models. The researchers found method” research. This research had found a lot of
the universality of service innovation domain unique innovative behaviors during service process
and diversity of service innovation type and and revealed a lot of special innovative essence and
emphasized the special status of “organization rules. “Special innovative models” and “service
innovation”, “unique innovation”, and “structural specialty track” are the typical representative theory
reengineering innovation” in service industry. of this stage. Recently, the development trend of
Thereafter, some scholars described the innova- ambiguity and integration of manufacturing and
tion process of service enterprises with proposing service industry attracts the scholars to look for
relevant innovation models and had further study an “integrated method” to unify the product and
human resource and standardization similar to service. The typical representative research includes
manufacturing innovation. Kandampully (2002) the classification research by Gallouj and Wein-
proposed that innovation was the core competency stein (1997), and “4-dimension model” of service
for service enterprises and service innovation re- innovation proposed by Bilderbeek (1998) .The
lied on three relevant elements including technol- research finds and explains the rules of service in-
ogy, knowledge and relationship network. Ross L novation from various perspectives, and promotes
Chapman et al. (2002) claimed that network and the research method system of service innovation
development, information and exchange technol- to be gradually mature.
ogy, human capital, organizational change, intel- The initiation for Chinese academia to study
lectual property, competition and rule change are logistics innovation is a bit late with a couple
the main elements of service innovation. Based on of decades. Most of the research was developed
the research, the service innovation regularities regarding supply chain, information technology
were identified, new impact of the environment on and value-added services.
23
Research on the Innovation Mechanism and Model of Logistics Enterprise
Wang and Chen (2007) indicated that the third the PreSent SItuatIon
party logistics enterprises should identify their own analySIS of ServIce and
resources and core competency, understand the InnovatIon for logIStIcS
strategic relationships between the upstream and InduStry In chIna
downstream enterprises along the supply chain,
and follow the trend of logistics outsourcing and With the fast development of China’s economy
information technology development. Moreover, and the uptrend of world’s economic globalization,
they should pursue sustainable competitive ad- most enterprises hope to increase their profit by
vantage by providing valuable extended service, decreasing the cost of logistics, which offers a great
integrated service and distinguished service. opportunity for China’s logistics enterprises.
Peng (2007) found that exploring value-added
service was becoming the new trend of logistics development trends for
development. The third party logistics enter- modern logistics Industry
prises needed to strengthen service innovation and Service Innovation
and extend value-added service, emphasized
information construction and hence improved its Different enterprises have different understanding
core competency and logistics service standard. about logistics service. Generally speaking, it may
Han (2006) analyzed the importance of provid- be regarded as a yardstick to judge their capabil-
ing financial logistics service by the third party ity to save time and space for certain goods and
logistics enterprises and proposed the financial services which include all the service activities
logistics service model provided by different links from receiving the orders to the delivering them
along the supply chain. Li et al. (2006) designed a to customers.
dynamic model for service innovation of logistics According to the research in 2004, the world’s
enterprise, which described the driving factors for service industry accounts for 63% of the world’s
service innovation including external dynamics GDP. In some developed countries, it makes up
such as external tracks, doers, and logistics alli- 71% in the economy and 32% in China (Liang,
ances, as well as internal drivers such as strategic Z.P., 2005). It will surely continue to grow rapidly
management, employee creation and organization with the development of the economy. Therefore,
innovation. Liu and Wang (2007) discussed the the service industry has been the pillar for economy
service innovation paths and possible strategies development.
selected by various Chinese logistics enterprises. Logistics is a newly developed field in service
Liu and Li (2006) argued that the new path to real- industry; it is growing rapidly in the world and is
ize service innovation included: building relative regarded as the fundamental industry and artery
systems, effectively managing service innovation, in national economy. The level of its develop-
innovating based on customer needs, satisfying ment is an essential measurement for judging a
customer requirements and striving for the leader country’s modernization level and overall national
of service innovation. strength. It works as an accelerator in the economic
It is concluded that there is not adequate development. The mission for logistics is to offer
logistics service innovation researches in China first-rate service, to satisfy customers’ needs, to
and a big gap exists comparing with international develop and create customer value so as to add
research. Hence, the current problem is there is value in the overall process of logistics.
a lack of theoretical guidance for the practical Modern logistics service bears the character-
service innovation operation in most of Chinese istics of information technology, socialization
logistics enterprises. and integration with capability of innovation and
24
Research on the Innovation Mechanism and Model of Logistics Enterprise
25
Research on the Innovation Mechanism and Model of Logistics Enterprise
In terms of finished goods logistics, 24.1% will be The Faultiness of Serving Process
finished by enterprise and 59.8% will be handled
by the cooperation of enterprise and third party As most of the logistics enterprises are converted
logistics enterprises, only 16.1% is done by the from transportation enterprises or storage centre,
third logistics enterprises (Lv, G.R., 2005). The it’s difficult for them to provide integrated logistics
self-service-oriented service model will restrain service for their weaknesses in small scale and
efficient, professional and socialized development single function. 85% of income comes from the
of modern logistics service. While in commercial basic service and the rest of 15% is from value-
enterprises, 76.5% of logistics service is done by added and information service of logistics service.
enterprises themselves and 17.6% by suppliers. The basic service handles the market competition
From Table 1 it indicates market expectation with price without any innovation service content
for the third part logistics enterprises has changed which is far more different in developed countries
greatly compared with what it expects for the where it enjoys the supply-chain service from
traditional logistics service. The single service organizing production to distribution. Especially,
of logistics can meet the needs of the market and foreign logistics enterprises surging into the
the third part logistics enterprises must extend Chinese market put greater pressure on the local
their service. From the statistics, there is a great enterprises, and the price of old logistics service no
demand for the redesign of logistics network, the longer has any advantage and the competition of
construction of logistics information system and price doesn’t do any good to increasing profit. So
bar code scanning system. Meanwhile, people the competition among these enterprises changes
can see a strong demand for product packaging, from price to service gradually. As a result, the
distribution process, quality control of the raw present single service with less innovation and
materials, customer declaration and accounting value proves less competitive.
payment, etc.
Table 1. Market demand for logistics service. Data source: Li, M. & Fan, Z.Q., 2002
Existing Functions
Expectations of the
Service functions Production Enterprises
Content (%) Commercial Enterprises (%)
(%)
Warehousing custody 16 20 29
Main line transport 20 48 29
Local delivery 14 28 29
Processing and package 6 4 14
Network reproduction 12 0 0
Barcode Customization 8 0 0
Information system 10 0 0
Materials quality inspection 3 0 0
customs declaration agent 7 0 0
Payment clearing agent 4 0 0
26
Research on the Innovation Mechanism and Model of Logistics Enterprise
27
Research on the Innovation Mechanism and Model of Logistics Enterprise
28
Research on the Innovation Mechanism and Model of Logistics Enterprise
29
Research on the Innovation Mechanism and Model of Logistics Enterprise
procurement, production, marketing plans and constant perfection of the logistics service content
business process. Meanwhile, it can deliver the and level will result in the increase satisfaction
off line products to the distribution centers or to of customer enterprise to establish long-run re-
every retail outlet directly through the links such lationship with customer enterprises and expand
as transport, storage, transportation, handling, the sustainable development room. The logistics
packaging and labeling in accordance with the service innovation based upon industry technol-
requirements of the customer enterprise. ogy development is the significant source for
improving logistics service quality which includes
• Organization networking the model of logistics technology innovation and
logistics network innovation.
Integrated logistics carry out planning, design-
ing and practical implementing in accordance with The Logistics Technology Innovation Model
the network in a certain market region through The biggest difference between logistics service
the logistics operation organizations, logistics and general service is that general service mainly
business organizations, logistics resource organi- relies on the non-technology service of staff. So its
zations and logistics information organizations, innovation can be realized by improving manage-
and finally form a secondary logistics network ment organization structure and service procedure.
system consisting of logistics trunk network, While logistics service needs the support from
regional feeder network, and urban distribution logistics technology and equipment, its innovation
network in its service market region. contains both technology and non-technology in-
In this secondary logistics network system, the novation. What’s more, the technology innovation
node enterprises connect with the shared informa- of logistics service can improve the operating
tion platform and common operational activities. efficiency of logistics service with creating the
In accordance with the principle of division of time and space utility better and faster. The fact
labor and cooperation, each of them plays their proves that the adoption of advanced logistics
own core expertise, magnifies the function of technology such as information technology,
each network element so as to achieve the goals automatic stereoscopic warehouse and so on can
of rapid reaction of integrated logistics and total tremendously enhance the service competitive
cost optimization for logistics services. strength of logistics enterprise. Moreover, the big-
gest advantage of logistics technology innovation
The Model of Logistics Technology is that it is hard to imitate by competitors or the
and Logistics Network Based on cost of imitation is relatively high.
Industry Technology Development Modern logistics technology innovation runs
through the professional technology and manage-
Logistics service is the intangible procedure at- rial technology of various basic activities in the
tached to the tangible operation(such as transporta- whole logistics area. According to the source of
tion, storage, portage etc.) which occurs between technological thought and scientific principle, it
the customer enterprise and logistics staff, tangible includes logistics mechanical technology, logis-
product and logistics service system to solve some tics information technology, logistics electronic
substantial problems for the customer enterprises technology, logistics automatic control technol-
so as to improve their operating effect. In terms of ogy, logistics mathematics method and computer
logistics enterprise, its service is the essence of the technology etc. As for functional activity, it con-
operation. And the competitive logistics service tains transportation technology, storage technol-
guarantees its sustainable development. Only the ogy, handling technology, package technology,
30
Research on the Innovation Mechanism and Model of Logistics Enterprise
distribution processing technology and logistics ship network innovation and information network
information technology etc. And technological innovation etc.
form includes hard technology such as facility, Modern logistics is based on the supply chain,
equipment, tool etc, and the soft technology such and it is established on the base of strategic co-
as information network, logistics project and operation of all members in the chain. Therefore,
logistics system. As logistics innovation system building close corporative relationship with
presents in various aspects, Table 2 lists the most vendors, distributors, retailers and customers to
prominent areas for logistics innovation in real execute relationship management will basically
logistics operation, it promotes the development determine the integrated advantage of supply chain
of logistics service with systematization, integrity logistics and improve the competitiveness of lo-
and cooperativity. gistics enterprise (Photis & Panayides, 2005) .
Photis and Meko made the empirical study on
Logistics Network Innovation Model the relationship among relationship orientation,
With the rapid development of economy, the organization study, innovation and supply chain
traditional “Vertical integration” can not meet performance, and they discovered the relationship
the need of modern enterprise competition. In orientation didn’t directly result in supply chain
order to keep its flexibility and improve its es- innovation, but indirectly led to innovation by
sential competitive strength, enterprises outsource organization study to get supply chain perfor-
its logistics business to the third-party logistics mance (See Figure 4). The essence of strategic
enterprise. Therefore, it has become the basic corporative relationship of supply chain is to
tendency of logistics development to realize the realize the share of knowledge and information,
socialization of logistics service by developing meet the customer’s satisfaction quickly, flexibly
the third-party logistics service and strengthening and creatively. Innovating relationship network
third-party logistics service innovation. Under is to rebuild the relationship of supply chain to
this circumstance, innovating logistics network essentially rebuild value chain to gain the com-
to form the logistics service network based on petitive advantage.
supply chain becomes the inevitable choice (Li, The innovation of logistics relationship net-
Y.F. & Pu, G.A., 2003). The innovation model work objectively needs the innovation of logistics
of logistics network mainly includes network information network. Only realizing the innova-
innovation, channel network innovation, relation- tion of information network can achieve the real-
31
Research on the Innovation Mechanism and Model of Logistics Enterprise
Figure 4. Relationship among relationship orientation, organization study, innovation and supply chain
performance
time transfer and share of the information on supply • The value-added service of logistics has
chain member to reduce “bullwhip effect”. Hence, the feature of timeliness. With the gradual
the innovation of logistics information network development of logistics enterprise ser-
supplies the basic means for service innovation vice, the previous value-added service will
of logistics enterprises. evolve to be basic logistics service.
Logistics Service Model Based There are two types of models on value-added
on Value-Added Service service offered by logistics enterprise:
Logistics value-added service refers to various • Logistics service model based on integra-
stretching business activities under the require- tion of supply chain
ment of customer enterprises on the basis of
fulfilling logistics basic function. There are not The first step to realize the diversity of value-
fixed compounds for logistics value-added func- added logistics service is to achieve the integration
tion, and the definition for value-added function of supply chain. It involves the whole process
remains ambiguous. However, it belongs to various from the initial vendor procurement, manufacture
stretching services based on basic logistics service support for manufacture department, marketing
with obvious characteristics and creativity. support for marketing department to the prod-
The difference between logistics value-added ucts eventually distributed to the customers. The
service and basic service contains following integration of supply chain upgrades channel ar-
aspects: rangement to be a corporative power dedicated
to improve efficiency and competitiveness from
• Logistics value-added service is a deep several loose individual enterprises. So it requires
level of logistics service. It is a special all the members of supply chain to corporate with
value-added service scheme proposed after mutual trust to share the basic transaction data and
getting well known about customer enter- long-term strategic information so that the logis-
prise’s logistics needs, it is also the special tics enterprises can find out the effective means
service scheme faced to specific logistics and method to meet logistics need of customer
needs. enterprises with easily combining the experience
• The value-added service of logistics is to and capacity of supply chain member and then to
increase investment based on the basic create sustainable characteristics logistics solution
logistics service to gain the added value. so as to improve the competitiveness of whole
Therefore, it needs the extra logistics ser- supply chain (See Figure 5).
vice fee from customer enterprise.
32
Research on the Innovation Mechanism and Model of Logistics Enterprise
33
Research on the Innovation Mechanism and Model of Logistics Enterprise
logistics company operating in Shenzhen Futian and is recognized as “The First Research Base of
Free Trade Zone (FFTZ) with registered capital High-tech Product Parts Distribution” and “The
of 50 million HK$. There are four professional First Demonstrative Enterprise of Electronic Part
subsidiaries as Fuhai division, China Overseas Distribution” by China Logistics Technology As-
Transportation, China Overseas Information, sociate, and it is also ranked as one of the 34 key
China Overseas Passenger and Cargo Agent with logistics enterprises of China by China Economy
the total capital amount of 270million HK$. It is a and Trade Committee. The Company always
comprehensive logistics enterprise with electronic holds the management belief of “Credit First,
products, mechanical manufacture and business Customer Supreme.” So it strives for offering safe,
etc as client groups integrating with logistics qualify, fast and accurate whole-course the third
information technology, project consultant, JIT party logistics service for customers. With years
distribution, international cargo agent, multimodal of unremitting efforts, the company has got the
transport, trade agent, custom declaration and honor of “Top 100 Logistics Enterprises of China”,
inspection, credit settlement. “Experimental Base of Chinese Logistics”, “34
COL locates in the east and west port area of Key Logistics Enterprises of China”, “The Top
Shenzhen with taking the Pearl River Delta as Technology Enterprise of Shenzhen” etc to earn
the base, it selects key cities such as Shanghai, the wide acceptance by the society.
Chongqing, Xi’an, Tianjin, and big cities in Japan Experiencing years of sustainable develop-
and Korea, the east and west port area in U.S.A. ment, COL has clarified the strategic target for
as the logistics nodes to develop the logistics net- future: Building configuration-optimized logistics
work covering China, south-east Asia, Europe and entity network, unblocked and perfect logistics
America etc to make sure customer’s goods can information network, reasonable logistics business
arrive in any place of the network anytime. network to make COL a comprehensive modern
COL was the first company in logistics in- logistics enterprise with completed functions, per-
dustry of China to get the ISO9002 international fect network which is top in China and well-known
logistics authentication in 1999. It is also the first in the world. Hence, the core business needs to
enterprise in the logistics industry to develop pay full attention to the following areas:
high-tech electronic product parts distribution
34
Research on the Innovation Mechanism and Model of Logistics Enterprise
35
Research on the Innovation Mechanism and Model of Logistics Enterprise
• The supply chain of container transport supply chain. Establishing the service
transportation system of container transport supply chain fits
COL’s development, and it is also the practical
COL started with traditional shipping industry choice based on its own resource.
and set up five professional shipping companies As for the demands of external market, the
include container transportation, tanker transpor- backward situation of domestic road assemble
tation, bulk cargo transportation, special cargo transport offers the market for COL’s development
transportation, and ocean passenger shipping. of container transport supply chain. Compared
The container’s total number of slots is ranked with the fast development of Chinese ocean con-
as No.1 in China and rise to No.5 in the world. tainer transportation, Chinese onshore container
The competition of shipping industry is more than transport lags behind seriously which affects the
the competition of this industry, it will eventually vertical development of container transport sup-
reflect the competition of the whole supply chain. ply chain. What’s more, according to the routine
Recent years, the competition of shipping industry of transport clause in international trade, people
brings the maximization and ultra-maximization usually adopt Container Yard to Container Yard
which on the one hand greatly strengthens marine rather than door-to-door, it breaks container trans-
transport capacity; on the other hand, it indicates port supply chain and restrains the development
the shortage of port infrastructure, wharf operation of container transport. Besides that, there are
capacity, storage yard capacity, onshore allocation, few big companies with big scale of container
port collection and separation which becomes the and goods source. This development blank offers
restrictive factor for the development of shipping COL the blue sea of market and the opportunity
industry. Actually, the competition of shipping of developing container transport supply chain.
industry has extended to the onshore from the This strategic positioning not only suits the need
ocean which includes allocation transportation of Chinese logistics market development, but also
and logistics service onshore and in the wharf. displays COL’s core competitiveness of “valuable-
Therefore, the development of main business of ness, scarcity and hard to imitate.” to enrich the
COL requires the cooperation of onshore logistics brand of COL with distinctive characteristics.
development; and the development of COL con-
tainer transportation also needs the cooperation • Developing the third party logistics
of the development of onshore container transport
supply chain. There are many significant factors COL provides the professional third party
in COL’s success, one of them is “major business logistics solutions such as bonded storage, import
centered” strategy. and export distribution, cross-regional transport,
customer declaration agent, simple processing,
• Discovering the blue ocean of market sorting package, freight agent etc to thoughtfully
meets customer’s personalized need comprehen-
All logistics enterprises especially those with sively with discovering customer’s deep demand
similar background have something in common. (See Figure 7).
The uniqueness of COL strategic option is to have
its own choice to select the segment market to • Standardized service
establish its development strategy and tactics ac-
cording to its specific condition. COL chooses the COL offers the secure and efficient service such
onshore container transportation as the mainline as providing domestic, Hong Kong and Guang-
to build the functions of every link in container dong cross-border trunk and branch transportation,
36
Research on the Innovation Mechanism and Model of Logistics Enterprise
37
Research on the Innovation Mechanism and Model of Logistics Enterprise
warehouse and on the way so as to accelerate the and information transmission with browser/ server
circulation of material. What’s more, it tracks the three levels of applied models. This system uses
whole process to make sure the accuracy of JIT standard B/S structure, and the customer end will
distribution and promote capital withdrawal. In call by browser in the way of WEB. Moreover, it
terms of warehouse system management, COL integrates various logistics technologies such as
strives for meeting customer’s satisfaction in GPS/GSM/GIS technology, bar-code technology,
goods information management with the sup- EDI technology and so on to develop various inter-
port of self-researched advanced IT system, EDI faces to secure the effective information exchange
technology, wireless network, portable terminal, and integration with other external system. This
wireless radio frequency and bar-code recognition system also contains the advanced logistics infor-
technology etc. mation applied technology demanded by modern
logistics business such as EDI, bar code, intelligent
technology Innovation in col card, GIS, GPS and electronic commerce etc.
COL 2000 is making up of four parts including
Integrated Solution of Logistics logistics business management system, logistics
Information Service enterprise management system, logistics e-Com-
merce system and customer service system. The
COL takes independent intelligent property of business management system consists of storage
logistics management information system as core, management system, distribution management
integrates the advanced logistics information tech- system, transport management system, clearance
nology such as bar-code, RFID, GPS/GIS、EDI management system, settlement management
etc to implement electronic management on the system, contract management system, customer
whole process of order, storage, distribution, relation management system and data exchange
transport, custom clearance, settlement and so on. system; enterprise management system includes
With the help of internet, it offers the service such finance management system, statistics manage-
as on-line order, stock inquiry, expenses inquiry, ment system, administration management system
vehicle and cargo track etc to dynamically assist and decision support system.
customer about trade operation. Meanwhile, it real- The function of electronic commerce system
izes the seamless docking with customer informa- mainly involves: real time inquiry, bill input, order
tion system combining with flexible data exchange online, information feedback, on-line quotation,
way to eventually improve the information share on-line transaction, alliance online, data exchange,
degree of the whole supply chain, the speed of information outsourcing and project bidding and
cash flow and logistics operating efficiency. so on.
COL is the professional logistics company that Customer service realized by system contains:
initially starts the third party international logistics procedure inquiry, in-stock inquiry, in-transit
service. It has accumulated rich logistics operat- inquiry, customization inquiry, bill download,
ing experience for years and developed a set of real time track, customization information and
comprehensive logistics management information consultant service.
system fitting for international logistics operation With years of practice and improvement, this
standard and Chinese situation, namely China information system successfully secures the rapid
Overseas Logistics 2000 (COL 2000) development of COL’s business and meets the
COL 2000 adopts popular Internet/Intranet/ satisfaction of logistics information integrated
Extranet network structure to work out trade pro- management under E-C settings and more than
cedure management, data security management 200 clients’ information service. Moreover, it also
38
Research on the Innovation Mechanism and Model of Logistics Enterprise
supports COL’s information management such as erating procedure in the whole logistics network.
storage management, transport management, dis- While nowadays, because of the rapid develop-
tribution management, freight agent management, ment of logistics, it consists of transport, storage,
declaration management, business management, package, handling, distribution processing and
settlement management, administration manage- logistics information and they are mutually con-
ment, personnel management, decision manage- nected, influenced and restrained. The new func-
ment, client management and rebuilding enterprise tion by the organic combination and coordinative
procedure etc. operation of these links makes logistics function.
The harmonious and integrated operation of the
Logistics Supply Chain whole logistics network needs a set of advanced
information system which supports the real time
Under the traditional logistics management model, transfer of information in various links.
every link of COL such as transport and storage The overall structure of COL logistics system
is isolated, so there is no unified and standard op- software is a three-level systematic stereo struc-
39
Research on the Innovation Mechanism and Model of Logistics Enterprise
ture and an expanding planar structure. The three service such as storing, setting and assembling,
levels of structure of the system are: the level of checking, repacking and labeling to realize the
business processing, the level of comprehensive docking with overseas sales, stock real-time
management, and the level of management deci- renewal, the reduction of the cost of overseas
sion support. Theses three levels represent various operation and human resource to guarantee the
applied aspects such as various business manage- due date and the promote repair and return for
ment elements and information system. Thus COL rejected goods (See Figure 9).
successfully executes logistics resource planning
management system and multimodal transport MILK-RUN Model
logistics management system to provide integrated It is the model of material logistics. Firstly the
solution for customer such as JIT production dis- materials and parts from many vendors will be
tribution, stock cost control, business procedure gathered to a hub, and then they will be assembled
reduction, transport route optimization, reverse and distributed to the manufacture and all the jobs
logistics recovery etc.(See Figure 8). will be operated on their own.
Because the delivery of different vendors is
Operating Model of COL lack of unified and standard management, it brings
various problems in information communication,
Cargo Center Model transport security, delivery to increase the dif-
Freight Gathering Center: this model will firstly ficulty of management. In order to improve this
gather the goods from large number of vendors, situation, COL runs MILK—RUN model to self-
and then they will be delivered to the freight design distribution route, and takes goods from
center of COL. Generally speaking, the vendor different vendors according to everyday need of
will subcontract the job of freight gathering to receiver, and then distributes to manufacture by
logistics company that will distribute goods as chain stores in different places of COL. As the
the advanced agreed frequency. (For example, management of supplying goods is unified, it
every week, and every day.) All the goods will be is expected to reduce the cost in bulk logistics
delivered to freight gathering center, and then the transport (See Figure 10).
center will distribute all the goods to the different
places of the world by passenger and cargo agent. VMI Model
With freight gathering center, COL can collect In the inventory management practice of manu-
all the goods from vendors to offer value-added facture product, the traditional inventory control
method has gradually shown two inherited weak-
nesses: the first is the inventory management of
Figure 9. Cargo center model of COL enterprise is too simple and extensive with few
40
Research on the Innovation Mechanism and Model of Logistics Enterprise
advanced inventory management technologies ent, the suppliers have his own inventory, and
and methods which results in the high inventory client has his inventory to meet satisfaction as
charge. The second is many enterprises manage well. This abounds inventories along the whole
inventory in their own ways which lead to the supply chain and enlarges the demand to greatly
serious repetition of inventory facility construction raise marketing cost of product. VMI in COL
and widespread waste phenomenon. focuses on the integration of supply chain with
Nowadays, as many enterprises carry out SCM, gathering most of inventory for vendor to manage
the weakness of traditional inventory control by integrating business function between vendor
method seems more prominent: the enterprise in and client. During the implementation, vendor
every node usually enlarges inventory to handle will continuously track client’s sales statistics and
with the sudden change on demand to protect their inventory state, and promptly respond the need of
own benefit. It is understandable, but it actually market by timely adjusting enterprise production
increases total inventory cost of supply chain and and supply to vendor (See Figure 11).
eventually raises the operating cost of supply chain The idea of VMI in COL is mainly on the
and reduces its integrated competitive strength. integration of SCM. That is, VMI tries to reduce
Under the circumstance that the competition of the total inventory charge by integrating inventory
enterprises has transferred to the competition of control function of enterprise in each node in sup-
supply chain, it will undoubtedly affect supply ply chain. The basic content of VMI is a method
chain enterprises to gain dominant advantageous that vendor and user have strategic cooperation
position in competition. Therefore, it is necessary to adopt the method to minimize the cost for two
for enterprise to reform traditional inventory parties and ask vendor to manage inventory under
control method to seek the new control model satisfactory target framework. Compared with
to cut the inventory cost. And Vendor Managed traditional control method, VMI has following
Inventory (VMI) can effectively solve the man- characteristics: (1) Cooperation: the success of
agement problem. VMI objectively needs enterprises in the supply
VMI is a brand-new inventory management chain to cooperate closely based on mutual trust.
model for the integration of supply chain. And (2) Mutual-beneficial: VMI pursues win-win
it brings profound influence in supply chain solution, that is, what VMI concerns is how to
management. It is a strategy of the procedure reduce two parties’ inventory cost, but not how to
cooperation between vendor and customer. And
it to some extent decreases the inventory level
Figure 11. Vendor managed inventory model of
of whole supply chain and reduces the repetitive
COL
operation between vendor and customer. Thus it
can be regarded as an effective channel to realize
inventory optimized control in SCM.
The basic idea of VMI in COL is to integrate
the inventory control function of enterprises in
each node of supply chain so as to reduce the
total inventory charge. As a new model of SCM,
it brings the enterprise the advantage of low cost,
efficient supply speed and flexible market react-
ing ability.
General speaking, inventory management is
separated. In order to ensure the supply for cli-
41
Research on the Innovation Mechanism and Model of Logistics Enterprise
distribute cost load of two parties. (3) Interaction: RFID, GPS/GIS、EDI etc to implement
VMI requires active attitude in cooperation to integrated electronic management includ-
realize fast reaction and improve the situation of ing order, storage, distribution, transport,
high inventory charge for information blockade. declaration, settlement and so on.
(4)Protocol: VMI needs enterprise share the same • It actively explores the realization of opti-
objectives to clarify their responsibility and obliga- mal logistics operation with the support of
tion. Specific cooperative issues are clearly ruled information technology. COL establishes a
with framework agreement to ensure feasibility supply chain to integrate transport, storage,
of operation. package, handling, circulation processing,
logistics information and so on.
• It realizes the strategic option based on en-
concluSIon and terprise characteristics. For example, COL
reSearch tendency chooses onshore container transport as the
mainline with insisting on the strategy of
According to the above empirical study about “main business centered”. Centering on
the COL, the following research conclusions and this mainline, it establishes the function of
development tendency could be summarized. each link in supply chain to set up the ser-
vice system of container transport supply
Service Innovation in chinese chain.
logistics enterprises • It actively explores and develops the third
party logistics. For example, COL can of-
There concludes the features of technology inno- fer professional third party logistics solu-
vation of domestic logistics enterprise combining tion such as bonded storage, import and
with the research on COL service innovation. export distribution, cross-regional trans-
port, agent declaration, simple processing,
• It establishes comprehensive logistics in- sorting and packing, international freight
formation system to realize 24 hours lo- agent and so on. And it has become one
gistics network monitoring. For example, of important strategic routes for company
COL bases on Internet/Intranet/Extranet development to comprehensively meet
network structure and browser/server three customer’s personalized need, to cultivate
levels applied model to use the advanced lo- customer’s deep need to eventually earn
gistics applied technology such as EDI, bar customer’s acceptance and trust.
code, intelligent card, GIS, GPS, electronic • It expands the value-added service such
commerce to establish COL 2000 system as transport service, passenger and cargo
which realizes business procedure man- agent, storage and distribution. For ex-
agement, statistics safety management and ample, according to the different types of
information transmission management. business of customer, COL provides the
• It runs logistics integrated electronic man- storage distribution model such as transfer-
agement with RFID in the link of cargo ring and connection, bulk in and bulk out,
storage and distribution. As COL takes in- simple sorting, assembling and packing.
dependent intelligent property of logistics Meanwhile, it offers the value-added ser-
management information system as the vice to meet customer’s sale need. In terms
core with integrating advanced logistics of warehouse system management, COL
information technology such as bar code, strives for meeting customer’s satisfaction
42
Research on the Innovation Mechanism and Model of Logistics Enterprise
According to present home and broad research It is expected to have quantitative analysis of
on logistics innovation service and the empirical Chinese logistics service based on Chinese real
analysis in this article, it concludes the following situation of social production with empirical
fields need more efforts: statistics.
Combining with supply chain management Chapman, R. L., Soosay, C., & Kandampully,
theory and logistics management theory, people J. (2002). Innovation in logistics and the new
can have deep and theoretical study on produc- business model: a conceptual framework.
tion, sales and logistics service model of Chinese Managing Service Quality, 12(6), 358–371.
circulation enterprises and put it into practice. doi:10.1108/09604520210451849
Chen, F. (2005). Explanation of the new concept
• All-society logistics service innovation
of modern logistics services. Journal of Storage
model
Transportation & Preservation of Commodities,
1, 10–12.
According to the research on the third party
logistics service innovation model in circulation Drucker, P. F. (1985). Innovation and entrepre-
industry, it can be extended to the research of neurship: practice and principles, New York:
logistics service innovative model of all-society Harper & Row.
service and manufacture industry to improve the
43
Research on the Innovation Mechanism and Model of Logistics Enterprise
Gallouj, F., & Weinstein, O. (1997). Innova- Min, L., & Zhiqi, F. (2002). The logistics model
tion in Service. Research Policy, 26, 537–556. selection. Outlook Weekly, 32, 39–40.
doi:10.1016/S0048-7333(97)00030-9
Panayides, P. M., & So, M. (2005). Logistics
Haiyin, L., Xiangdang, W., Yunkai, Z., & Yanling, service provider-client relationships . Transpor-
N. (2006). Analysis on the Impetus of 3PL service tation Research Part E, Logistics and Transpor-
innovation. Journal of Logistic Technology, 5, tation Review, 41(3), 179–200. doi:10.1016/j.
15–17. tre.2004.05.001
Han, Q. (2006). Service Innovation of 3PL Com- Peng, H. (2007). Research of customer services
pany: financial logistics. Beijing, China: Univer- of third party logistics business. Beijing, China:
sity of International Business and Economics. Beijing Jiaotong University.
Huiming, L. (2006). Logistic service and integrat- Sundbo, J., & Gallouj, F. (2000). Innovation as a
ed innovation. China Ocean Shipping Monthly, loosely coupled system in services. International
6, 71–73. Journal of Service Technologies and Management,
1(1), 15–36. doi:10.1504/IJSTM.2000.001565
Jun, L., & Wang, Y. (2007). How to Select the
Way and Strategy of logistics enterprise service Tian, X. (2008). Research on the innovative model
iInnovation. Journal of Logistic Technology, and guarantee system of the third party logistics
26(1), 14–16. service in household appliance industry. Tianjing:
Tianjin Polytechnic University.
Kandampully, J. (2002). Innovation as the core
competency of a service organization: the role of Wang, X., & Chen, G. 2007). The services innova-
technology, knowledge and networks. European tive research on third-party logistics enterprise.
Journal of Innovation Management, 5(1), 18–26. Journal of Modern management science, 2, 5-7.
doi:10.1108/14601060210415144
Xianwei, S., & Zhang, Z. (2001). The Service
Lei, L., & Guisheng, W. (2003). Service innova- model and development research of modern
tion. Tsinghua University Press. Logistics. Science of Science and Management
of S. & T, 12, 46–50.
Li, Yanfong, & Pu, Guoan. (2003). Research on
the value of third-party logistics. Journal of Com- Zanping, L. (2005). Service science-an emerg-
mercial Research. (17), 166-168. ing science in 21st century. China Information
Review, 511-13.
Liu, L., & Li, H. (2006). How to achieve service
innovation by logistic enterprise. Logistics Infor Zhen, L. (2007). Study on the logistics industry
Monthly, 9, 67–69. disparity between China and developed country.
Journal of Fuiian Radio & TV University, 3,
Lu, G. (2005). The analysis of situation and ques-
35–37.
tion about the third party logistics in our country.
Journal of Logistic Science Technology, 28(6),
50–51.
44
Section 2
Logistics and Service Innovation
46
Chapter 3
Managing Customer-
Centric Information:
The Challenges of Information and
Communication Technology (ICT)
Deployment in Service Environments
Martin R. Fellenz
Trinity College Dublin, Ireland
Mairead Brady
Trinity College Dublin, Ireland
aBStract
Despite a long history of business-orientated information and communication technology (ICT) deploy-
ment, contemporary organizations continue to struggle with customer-centric implementation of new
technologies that are profitable and contribute to sustainable service business success. This chapter
reviews the difficulties inherent in using ICTs to manage customer-related information, and identifies the
particular challenges for customer-centric deployment of ICTs. It provides a model of different levels
of customer centric information use in organizations which helps understand how companies can be-
come more customer centric in their information use. It reviews implications for future research in this
emerging area and concludes that the challenges of ICT deployment and use must be addressed with an
uncompromising focus on customer value as the central principle of both ICT design and deployment,
and of information management in service organizations.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Managing Customer-Centric Information
Figure 1. The role of customer centric ICT deployment, use and information management for sustained
service-based business success
In this chapter we discuss the challenges The reciprocal relationship between such
for companies of adopting customer-centric ICT deployment and use on the one hand, and
information management involving ICT. The customer centric information management on the
core premise of this chapter is that to achieve other, is the central focus of this chapter. More
sustainable service-based business success, all specifically, we identify and consider challenges
firms need to adopt a service-dominant logic involved in deploying and using ICT in service
(Vargo & Lusch, 2004, 2008) as the basis for environments to enable customer centric informa-
organizing and managing their internal and tion management.
market oriented activities. This in turn neces- The chapter is structured as follows: We briefly
sitates a customer centric orientation throughout consider the dynamics of sustained service-based
the organization, which demands significant business success by discussing the service domi-
changes to the predominant functional orga- nant logic and customer centricity. In the light of
nizing principles as well as to predominantly this discussion we then consider in more detail the
functionally oriented mindsets still found in requirements for ICT deployment and use, and in
most service organizations. Such a customer particular the role of customer centric information
centric orientation in formal (e.g., structural) and management, in service organizations. We present a
informal (e.g., cultural, behavioral) aspects of model of different levels of customer centric infor-
service organizations requires and – in turn – is mation use that highlights the differences between
supported by customer-centric ICT deployment product and customer centric approaches. We then
and use, as well as customer centric information present suggestions for further research to advance
management (see Figure 1). understanding of these crucial issues.
47
Managing Customer-Centric Information
48
Managing Customer-Centric Information
to derive competitive value from such deep cus- and dynamic needs (Vargo & Lush, 2004). It leads
tomer engagements, companies must understand to a customer centric, co-creational and relational
how to utilize this information. model of business that requires technology and
self services technology deployment to be aligned
understanding the Service with the service dominant logic.
dominant logic
49
Managing Customer-Centric Information
means that all parts of the customer centric orga- not to the future of the business or to its success.
nizations are aware of how their activities directly What the customer thinks he/she is buying, what
and indirectly contribute to (or detract from) the he/she considers “value” is decisive - it determines
value that customers derive from their interaction what a business is, what it produces, and whether
with the company, and endeavor to maximize it will prosper” (1954: 37).
their contribution to the important outcome of
customer value creation. Therefore, customer cen- A recent Bain study showed how far most
tricity goes beyond simple customer orientation. companies diverge from this understanding. Only
The term customer orientation is variably used 8% of customer reported that they felt they re-
to describe activities (such as customer relation- ceived excellent service, while 80% of companies
ship management) that directly interface with felt that they were providing excellent service.
customers, or parts of companies (such as sales Another survey on Why Customers Quit found
departments) that directly interact with customers. that 68% defect because of a company’s attitude
Also, it often refers to any activities that attempt of indifference towards them in the long term
to (more) directly respond to customer needs and (Nadeem, 2007).
requirements. What distinguishes these practical For companies to truly embrace customer
operationalizations of customer orientation from centricity there is a large amount of reorientation
real customer centricity is the latter’s recognition needed for the strategic move from a product or
and acceptance of the primacy of customer value finance focus. Many companies are not prepared
creation over any other organizational activity. to undertake the challenging changes which would
What this means is that a customer centric com- ultimately be rewarding (Shah et al., 2006). Gal-
pany does not simply build its activities around braith notes “the product-centric mind-set is an
their customer. Rather, it places the customer – in entrenched one and, like the pit bull, does not re-
the form of customer value creation - at the heart linquish dominance easily…with many companies
of all its activities. simply putting a cosmetic gloss of customer focus
The difference between customer centricity and sprinkled around the edges” (2005: 1). Companies
product or company centricity is more profound need to engage fully with the customer centric
than simple differences in sets of key metrics, in concept for it to succeed (Galbraigh, 2005). In a
management preferences, or in formal structures product or finance centric focus the customer is at
and processes. It also refers to a fundamentally the end of the value chain and separate from the
different understanding regarding the nature and processes which are all company focused. Within
role of the company. This philosophy, ideology or this concept there is an orientation towards lean
identity revolves around the primacy of customer production with a premium on efficiency and ef-
value, and expresses many of the tenets of the fectiveness of internal operations. What is needed
service dominant logic discussed above. is an orientation towards lean consumption – how
Many companies pay lip service to a customer all process including the organization’s interac-
centric focus and most companies fail to be cus- tions with their customers are designed and man-
tomer centric (Shah et al, 2005). Again, referring aged with a customer centric and services focus
to the words of Peter Drucker, customer centric (Womack at al., 2005).
organizations need to reflect the maxim that Expanding on Shah et al’s (2006) work there
are four dimensions that a customer centric
‘there is only one valid definition of business pur- organization needs to focus on: (1) A pervasive
pose: to create a customer. What business thinks customer-centric ideology or culture, deliberately
it produces is not of first importance-especially supported by active leadership towards customer-
50
Managing Customer-Centric Information
centric thinking and behavior of all organizational not realize real benefits beyond efficiency-based
members; (2) structural arrangements that align productivity increases because companies lack
and continuously realign the formal organization the requisite customer centricity to realize the full
to support service provision and customer value benefits from these systems (Fellenz & Brady,
creation; (3) systems and processes that support 2008). This has been compounded by the fact that
the customer centric logic, for example through many functional specialists such as marketers and
appropriate reward and control systems and IT specialists lack a deep understanding of how
through appropriate information availability and technology and markets interact, as well as how
use; and (4) revised financial metrics and financial technology influences behavior and cognitions
metric use that reflect the primacy of customer both externally and internally (Berthon et al.,
value creation and thus guide sustainable service 2005; Brady & Fellenz, 2008).
delivery and development. The basic philosophy It must be noted that the development and
of a customer centric approach is that the company deployment of ICTs has revolutionized the mar-
serves customers and that all decisions start with ketplace and in particular the service landscape
the customer, with customer knowledge under- with companies using technology to improve
stood as a valuable asset (Shah et al., 2006). service operations, increase service efficiency,
and provide functional benefits for companies
and customers (Lin & Hsieh, 2007; Matthing et
cuStomer centrIc Ict al., 2006; Meuter et al., 2003). ICT applications
dePloyment and uSe abound in service provision and new customer
focused services with a technology orientation
Many companies are struggling to understand from have created great new markets and offerings (e.g.,
both technological and business perspectives how Ebay, Google, YouTube, Wikipedia).
ICT can be used in service design and delivery From the consumers’ perspective, ICTs can
(Brethon, MacHulbert & Pitt, 2005; Fellenz & enable them to enjoy the services they require with
Brady, 2008), let alone to fully understand this more flexible choice of time and space (Meuter
from a customer or customer centric perspective. et al., 2003) and provides for increased consum-
Technology is currently not sufficiently recognized ers satisfaction (Lin & Hsieh, 2007; Bitner et al.,
as an important driver of the service development 2000). The self service technology (SST) literature
and management process (Agrawal & Berg, 2007). has also criticized the cost cutting nature of much
There is a lack of appreciation, often beyond a SST deployment and notes that self service works
cost saving imperative as to why, and how, tech- when the customer has an option to opt in or out and
nology is deployed in a service encounter. Much where the customer is at the centre of the design
of the technology deployed for services is not and operation of the technology. SSTs can also
reflective of a customer determined or customer create a technology barrier between the customer
centric perspective. In practice many companies and the company (Meyronin, 2004) though some
are struggling to fully utilize their current ICTs customer are more tech savvy and engaged than
and lack both the appetite and the ability to move the companies that serve them (McDonald, 2008).
into further ICT adoption and more challenging Some SSTs also raise privacy issues and have given
information management issues. rise to dubious business practices which are not
For many companies the design and deploy- customer focused but rather designed to unilater-
ment of ICT is not customer centric and many ally benefit the company. Self service technology
systems like CRM, decision support systems, can be customer centric – like the Eazy pass toll
internet, extranets and intranets and so on, do collection RFID tags, but other technologies
51
Managing Customer-Centric Information
like automatic telephone answering in customer efits. A customer centric perspective throughout
service environments which are designed for cost the organization also requires structural features
savings rather than for customer service often that enables the dissemination of customer infor-
irritates and annoys customers, and can actually mation and the coordination of customer centric
destroy rather than create customer value while activities throughout all parts of the organization.
attempting to increase interaction efficiency. Typical contemporary ICT deployment models
Due to the rapid growth of ICTs and the many do not appear to support such customer centric
challenges of adoption, marketers and other information use.
organizational professionals need to gain an in- More specifically, it appears that in most ser-
creased understanding of consumer perception vice organizations, much of the responsibility for
and use of these technologies (Venkatesh, 2007; assuring the recognition and use of customer needs
Lin & Hsieh, 2007; Nysveen et. al., 2005). What and wants is allocated to the marketing function.
companies must search for and study is how to Pragmatically, however, the role of marketing
make the service more comfortable, distinctive, varies across industries and companies, as does
enjoyable and memorable. To find the optimum its success in actually delivering added value in
balance between human and technology is a mar- this role. Recent studies show that over the last
keting and business challenge. As technological decade marketing is no longer highly regarded
innovations continue to be a critical component within organizations, that there has been a move
of customer-firm interactions, technological inter- to focus on tactical rather than strategic aspects
faces that enable companies to produce a service within marketing, with an over focus on adver-
independent of direct service-employee involve- tising and promotion rather than real marketing
ment are changing the way consumers interact (Gronroos, 2006; Webster, 2005; Wind, 2008).
with firms to create service outcomes (Meuter et Marketing practices need to change to embrace
al., 2003). “They depend on customers ‘opting new mental models of rigor and relevance in this
in’ rather than merely acting as passive targets… new world and what should be a new world of
making marketing a joint, cooperative process” marketing with new skills and abilities (Wind,
(Mitchell, 2002: 77). These modes of interaction 2008). It is questionable, however, if marketers
are expected to become key criteria for long-term typically have the relevant skill set for this task
business success (Lin & Hsieh, 2007). (Brady, Fellenz & Brookes, 2008; Webster, 2005;
With heightened interactivity between cus- Brady and O’Connor, 2007), as well as the ability
tomer and service provider, often through tech- to challenge the system(s) and other functions to
nological platforms that monitor, scan and record provide them with the information they need for
customer engagement with the company, a core their tasks (Davenport, 2006; Wind, 2008) This
challenge is how to manage the huge amount of is particularly important where new ICTs are
data flooding into companies. Once companies considered or deployed because of the danger of
receive customer information they face the chal- them detracting rather than aiding customer cen-
lenge of how to use it in ways that support customer tric decision making, for example by “blocking
value creation. It remains unclear, however, how the use of experience, intuition and creativity in
the transformation of customer-related data into handling information” (Piercy, 1981:4; see also
information and the utilization of the value of this Lurie & Mason, 2009).
information should be coordinated, and where In addition, even in service organizations most
such coordination should be located. We have ICT deployment is designed and driven by the
argued elsewhere (Fellenz & Brady, 2008) that IT function who control the IT budget and the
a facilitation or oversight role may provide ben- relevant technical skills. Business intelligence,
52
Managing Customer-Centric Information
analytics and reporting processes as designed – revenues, growth, and margin – don’t reward
from this functional perspective, however, often cross-silo cooperation or customer centricity’
have a strong or even exclusive technological (Gulati & Oldroyd, 2005: 6).
orientation. Not only does research show that Therefore, the challenge of finding and imple-
aligning such systems with business needs is menting the most appropriate role for ICT must
problematic according to half the IT executives be based on a holistic understanding of the dif-
studied (McAffee, 2006), but IT functions rarely ferent, competing, but necessary orientations of
take any direct note of customer preferences and marketing, IT, and finance. Specifically, (1) the
needs. As a result, existing ICT systems and ar- technologists’ drive to use what is technologically
rangements are neither designed nor suitable for possible, and (2) the drive of a finance focus on
customer centric information use, and while new cost cutting and the business logic that requires
systems try to achieve more customer informa- short-term profitability, must be aligned to the (3)
tion transparency (see Lurie & Mason, 2009), the customer centric logic that places customer needs
integration with customer value creation processes and customer value at the heart of matters and of
lags behind. Customer relationship management service companies’ efforts to achieve longer-term
systems show a 65% failure rate (Gartner, 2001; economic viability and sustainability. (Day, 2006;
Shah et al., 2006), and only a minute proportion Fellenz & Brady, 2008). This must happen in the
of studied companies indicate that their systems context of a shared customer centric orientation
provide sufficiently comprehensive and customer throughout the organization.
centric information (Anderson, 2005: Shah et
al., 2006). Given the difficulties and failure rates
and the cost involved in deploying modern ICTs InformatIon management
(Davenport, 2006; McAffee, 2006), many service from a cuStomer
companies try to minimize cost and risk of new centrIc PerSPectIve
ICT, and fail to see the central role of ICT for
successful customer centric orientations. A customer centric orientation throughout the
Given the costs associated with ICT systems, organization requires customer centric informa-
their design and deployment is often also closely tion management. This refers to the collection,
monitored and controlled by the finance func- processing and use of relevant information about
tion. Thus, cost/benefit analyses and the focus customers in a way that enables all organizational
on return on investment primarily through cost participants to support and directly contribute to
reduction often guides design and decision pro- customer value creation. This includes not only
cesses. Customer focus is too often an added if not understanding that they need to harness the cus-
overlooked aspects of such processes that aim at tomer’s provided information in ways that benefit
creating and maximizing short-term shareholder – and delight - the customer, but they must also
value rather than jointly maximizing long-term protect the privacy of that information, and to
customer and organizational value (Ambler, 2001; avoid at all cost to use that information against
Shah et al., 2006). Most financial measures are the customer. Too many companies do this by
unsuitable for measuring or managing customer charging them more fees or bombarding them
centric strategies and plans and are “too narrow, with unwanted offers (Johnson, 2007).
too late and too backward looking. They also don’t Information about customer needs and prefer-
look deeply into drivers and they ignore the real ences plays an important role in service businesses,
value of intangible assets.”Wind (2008:25) “The and the full utilization of customer-related data
product-focused metrics most companies rely on and its transformation into usable knowledge
53
Managing Customer-Centric Information
is key to competitive success. Such knowledge Aligned to this companies often try to keep
“represents the currency, as well as the scorecard, every little bit of information they have on their
of the information age. Only companies with deep customers when their information management
knowledge about their customers, competitors and focus should be on data minimization and informa-
operations will be winners in this age”. (Sisodia, tion availability. This involves moving away from
1992:2). Knowledge and knowledge manage- the mindless collection of largely meaningless
ment is a crucial contemporary issue. Too often data by identifying, processing, aggregating, and
managers assume that data equals knowledge or deploying information where needed (Bradlow &
competitive intelligence. In fact, from a business Fader, 2009). Many companies keep excessive in-
perspective data is worthless unless it is given formation and default to near complete data storage
meaning, utilized properly, and deployed to help because appropriate data selection processes and
generate economic value and competitive advan- information management tools do not exist. Any
tages. (e.g., Myburg, 2000). company can generate basic data or descriptive
Similarly, too often managers believe that more statistics, but customer centric information man-
information means better information. Yet in an agement means to move beyond such descriptive
age of extreme information-overload companies information use. (See Figure 2)
cannot afford to be blinded by the assumption The first step in developing more customer
that mere data availability is the answer to any centric information management would involve
competitive challenge. The notion that more data a move towards more analytic information use
means more accurate information is logically and that focuses on customer relevant information to
empirically unsustainable. Increasingly, service helps select target customers as well as identify
organizations find themselves information starved the organizational practices that help maximize
in a data rich environment. A typical response to the value that the company creates for them. In
this problem is the attempt to increase the avail- other words, a focus on relevant data and data
ability of customer data, often attempted through minimization, which refers to finding and selecting
the investment in and deployment of more ICT to the gems that matter in the data, is needed as a
collect and process this data. Unfortunately, while core requirement (Humby, et al., 2008) However,
more data can sometimes lead to more information this step towards analytic information use also
(although this is not an automatic result), it does involves a reflective element in that it requires
not necessarily lead to better information. The the critical evaluation of information with a view
challenge for managers and other decision makers to identifying how organizational practices, pro-
in service organizations is to separate ignorance cesses and activities create customer value. Both
from confusion (Weick, 1995). Ignorance means the customer intelligence function and the value
that these decision makers do not have the relevant creation analysis function need to be fulfilled
information needed to make appropriate choice, for customer centric analytical information use
while confusion refers to the result of available to be achieved.
information that is inconclusive, allows different The next higher level of customer centric
and equally valid interpretations, and generally information use is the predictive use of informa-
fails to provide clear guidance for decision mak- tion. This includes both the prediction of trends
ing. According to Weick, “[t]o remove ignorance, and changes in customer preferences as well as
more information is required. To remove confu- the prediction of customer responses (e.g., to par-
sion, a different kind of information is needed” ticular interactions, or to new service offerings of
(1995: 99). To deal with these distinct informa- the company). As such, predictions require a much
tion requirements, different forms of information more complete and also subjective understanding
management are needed. of customer needs, preferences, and decision crite-
54
Managing Customer-Centric Information
ria. The predictive use of information necessitates not simply the next step in processing informa-
the use of richer data that can carry information tion in terms of effort, intensity, or technology
that can convey rich meanings. A challenge arising deployment. Rather, it requires different data
from such rich data is that it is frequently open to collection and processing mechanisms, including
different and multiple interpretations. As Daft’s in particular structural and procedural changes in
work has shown (e.g., Daft & Lengel, 1984; Daft, the organization to support more direct human
Lengel, & Trevino, 1987; Daft & Macintosh, 1981; involvement in both customer data collection and
Huber & Daft, 1987), the way to deal with such information processing.
ambiguity (i.e., the degree of uncertainty regard- Finally, in our model of customer centric in-
ing the actual meaning) and equivocality (i.e., the formation management we see the most elaborate,
number of different meanings that available data comprehensive and customer centric information
and information can support) is not to increase use at the level of holistic information use. This
the quantity of data but rather to increase the level is characterized by information manage-
quality of data, and the information derived from ment that enables customer perspectives to be
it. This can be achieved by increasing media and comprehensively identified and understood.
information richness and using mechanisms that Thus, decision makers throughout the organiza-
“enable debate, clarification, and enactment more tion have the information available that enables
than simply provide large amounts of data” (Daft them to identify, and -- more importantly -- to
& Lengel, 1986: 559). Meetings and other direct identify with relevant customer views. Such a
interactions among organizational members as comprehensive understanding requires tacit as
well as with customers therefore must become an well as explicit knowledge of customer views,
integral part of predictive information use. Thus, preferences, and experiences, and by necessity
just as the difference between descriptive and must involve extensive and intensive interactions
analytical use of information already discussed with customers (Nonaka & Takeuchi, 1995). In
is a qualitative rather than simply quantitative some ways, this almost requires that organizational
difference, the predictive use of information is decision makers ‘go native’ among customers, but
55
Managing Customer-Centric Information
a better way to think about this view is that the • richer data collection media;
formal boundaries between service provider and • more and closer interaction between com-
customer, which are much less meaningful in a ser- pany staff and customers;
vice context than in the transactional framework of • increasingly interactive, interdependent
company or product centric thinking, become less and iterative procedures for information
and less noticeable. Ultimately, holistic informa- processing resulting in negotiated and
tion management supports co-creative processes shared understandings of relevant custom-
of value generation that become transactive rather er-related information among staff; and
than transactional. A holistic understanding of the • the collection and use of increasing equiv-
service encounter underlies both the unilateral ocal and ambiguous data, and the associ-
organizational components of service provision as ated development of higher quality infor-
well as the mutual coordination between service mation about customer perspectives and
providers and consumers. Such activities, along experiences.
with the associated holistic information use, enable
customer centric information management which Higher levels of customer centric information
in turn helps create and maintain a customer centric use generally suggest a much more integrated,
orientation throughout the organization. cross-functional way of collecting, sharing, and
This model does not, as yet, provide a com- using information. This is in part necessary to
plete, validated model of customer centric infor- address the higher need for error detection and
mation use. It is not based on empirical data of correction at higher levels of customer centric
information use, but rather on the analysis of the information use. This can only be achieved
contributions that different information use can through more frequent feedback and through
make to customer centricity. Therefore, we do increased and direct customer involvement. To
not suggest that customer centric information use avoid and detect error, different forms of control
necessarily develops along the steps and in the cycles and feedback loops need to be utilized that
order described by the model. Rather, the model short-circuit the often delayed information from
suggests that the degree of customer centricity traditional external (e.g., market-research) and
in information use can be distinguished using internal (e.g., revenue, profit or other financial
these levels. The model may help to assess cur- indicators) information sources.
rent organizational information usage, evaluate Organizations who wish to employ customer
practices, procedures and systems, and guide centric ICT will need to change. In theory, by
considerations for further improvement to achieve identifying core customers and then appropriately
more customer centric information management. ‘slicing and dicing’ the relevant data, companies
What appears clear, however, is that the succes- should be able to coordinate the information they
sive levels of customer centric information differ have and transform it into customer-relevant
along a number of important dimensions. Higher knowledge and, ultimately, into customer-oriented
levels of customer centric information use tend action. Reflecting the understanding that this chal-
to be, inter alia, associated with lenge is fundamentally about how information can
be used and deployed in ways that enable and steer
• more human involvement in data collec- concerted action by different actors and groups
tion and customer-related information within and across organizational boundaries,
processing; Gulati and Oldroyd (2005) frame this ‘customer
• more direct and extensive customer in- focus journey’ as a coordination challenge. They
volvement in data provision and informa- argue that the road to achieving such customer
tion processing; focus in using information involves a number of
56
Managing Customer-Centric Information
important steps named communal, serial, symbi- will survive. Companies who move away from
otic and integral coordination. solely operational and finance focus and engage
Communal coordination, the first steps, with understanding the customer will be able
involves the collation of information about the to stay in business and continue to produce or
customer. The second step, serial coordination, provide what is valued by an even more discern-
working with analytic experts and ITC support ing and value conscious consumer or business to
to study the consumer’s past transactions to gain business customer.
insight into the consumer’s wants and needs. The Deploying ICT in customer-centric ways re-
third step, symbiotic coordination, focuses on quires all companies, especially companies with
developing an understanding of likely future pur- a high service component, to meet four major
chasing and consumer behavior by implementing challenges. These challenges include the (1) ac-
relevant information throughout the organization. quisition and processing of appropriate customer-
The final step (integral coordination) revolves relevant data, the (2) management and use of the
around enabling real-time responses to customer resulting customer-oriented information, (3) the
needs that are made possible by coordinating provision of supportive intra- and interorganiza-
all information among employees and the entire tional arrangements, and the (4) development of
organization at corporate level. This perspective the relevant understanding and skill-set among
highlights again that the challenge of customer- those charged with designing and operating the
centric ICT deployment transcends purely func- ICT. As suggested by Brady and colleagues (2006),
tional or technological issues. “[G]etting close most organizations currently lack the ability to
to customers is not so much a problem the IT or successfully meet these challenges, with many
marketing department needs to solve as a journey not even aware of the range of skills they need.
the whole organization needs to make”. (Gulati These skills include but are not limited to:
& Oldroyd, 2005:4).
Companies need to have co-ordination mecha- • ICT knowledge: Understanding of sys-
nisms to align tasks and information around the tems and technology (Levy et al., 2001;
customer and ensure that competing silos fully Ranchhod, 2004).
co-operate which could mean time consuming • Information Management: capturing,
and costly adjustment to internal operations. analysing and using large amounts of data
Staff need to be rewarded for breaking down the • Imagination to envisage how ICT and in-
silos to deliver customer solutions, and need to formation can be used in innovation and
be rewarded for sharing what they learn or know transformation ways
about the customer (Gulati, 2007; Gulati & Ol- • Study of interfirm and consumer technol-
droyd, 2005). ogy mediated relationships and self ser-
vice technologies (Schultze & Orlikowski,
Solutions and recommendations 2004; Howard & Worboys, (2003).
• Future perspective: Exploiting current and
The reality of the current global recession is that rapidly developing challenging technolo-
only companies that can clearly align with cus- gies like biometrics, neuromarketing, nano
tomer needs will survive. During the last decade technology etc.
of strong economic growth many businesses
succeeded by picking low hanging fruit. During It may be that there is a catalyst needed to
the increased competition in mature and even change business orientation to customer centricity
shrinking markets typical for a recession, only rather than operational efficiency and short term
companies that are sufficiently customer centric profit gains which has characterized the last decade
57
Managing Customer-Centric Information
of business and ICT implementations. The cur- useful input for practicing managers. Similarly,
rent global financial crisis and recession suggest the overarching framework that links service
that the business models in use for the last years, business success through the service dominant
and particularly the financial service models, are logic to customer centric orientations (see Figure
flawed and the whole system needs to be changed 1) requires further research. Though compelling,
(Fellenz, Augustenborg, Brady & Greene, 2009). much of the conceptual and theoretical work in
Now could be the time to hear the customers’ this area would benefit from further empirical
voices and for marketing to really engage with support.
customers and business. Unfortunately the market- Another important area is the use of ICT in
ing department and marketing know-how within service organizations. The issue of how such
organizations may not be strong enough after years ICT can best be used both for orienting internal
of tactical and restricted operations to suddenly activities towards customer value, and for man-
have the skills and ability to really advocate the aging external interfaces with supply chain part-
major customer centric changes needed and to ners as well as with consumers, offers important
operationalized these throughout business (Fellenz research topics. Regarding the internal arrange-
& Brady, 2008). Now may be the best time for ments and processes, the way in which ICT can
businesses to re-orientate towards the customers support or at least align with a customer centric
but many functional managers, including market- orientation in organizations presents a pressing
ers, may not ready for the challenge. As we have business problem. The external links are already
argued here, the companies that will succeed are considered by research streams located in supply
those that stay aligned to their customers and chain management and marketing, respectively.
who have a strong internal and external focus on However, additional research may consider using
customer centricity. a broader approach that creates value by cross-
ing such disciplinary boundaries that obscure
more comprehensive investigation and a more
future reSearch dIrectIonS comprehensive understanding of these matters.
Case-studies of successful customer-centric ICT
The deployment of ICT in service organizations deployment that includes thorough descriptions
and the customer centric use of information is and assessment of the underlying business case of
an emerging research area in need of substantial such ICT use and information use resulting from
conceptual, theoretical and empirical attention. A the technology could generate awareness and
number of fruitful avenues for investigation are interest among companies. Moreover, empirically
highlighted by the discussions of this chapter. supported and well-validated prescriptive models
Most obviously, the model of customer centric that guide the appropriate implementation of such
information use would benefit from concerted ICT deployment are also necessary.
investigations to provide empirical support for Finally, we believe that the challenges of
the conceptual distinctions it presents. Such product oriented thinking as well as of traditional
work should initially focus on the operational- functional orientations within service organiza-
ization of the different levels and establish their tions would substantially benefit from theoretical
relevant antecedents, consequences, correlates and empirical consideration of novel and alter-
and contingency factors. Ultimately, this work native approaches. Case studies of successful
would provide insights into the developmental service originations that have achieved success in
trajectories of customer centric information use overcoming such traditional barriers to customer
in service organizations which would provide centric service provision promise interesting and
58
Managing Customer-Centric Information
useful input into the development of competitive needs and efficiencies (Fellenz & Brady, 2008;
service organizations across many industries. Humby et al., 2008). What is needed is (a) a stra-
Identifying both best and poor practice would tegic fit between the way technology is deployed
support the development of prescriptive models and the needs of the business to create customer
for how to engage with this challenge. Academic value; (b) developing a fit between staff skills and
researchers clearly have a role to play in this, as do the customer centric information management
other stakeholders such as technology and service task, and (c) assuring a shared customer centric
providers, the companies themselves, and – most orientation across all business functions to fully
centrally – customers. align and successfully coordinate all relevant
information gathering, managing, analyzing and
utilization tasks for consumer benefit.
concluSIon In the current global recessionary economic
environment, the challenges of instilling such an
This chapter highlights the challenges for orga- orientation and coordinating complex activities
nizations of becoming customer centric which throughout the organization that focus on cus-
requires them to introduce and manage both tomer value will include the task of overcoming
their information use and their ICT systems to service organizations falling back on the traditional
reflect and support a customer centric orienta- cost-cutting and efficiency oriented retrenchment
tion. It suggests a framework for customer cen- responses. Increased competition in mature and
tric deployment and use of ICT and information contracting service markets requires more focus
management and offers a model of different levels on customer needs and wants. A customer centric
of customer centric information use in service orientation can help achieve this by focusing on
organizations. the most crucial of propositions for service com-
The logic of customer-centric ICT deploy- panies: increasing customer value.
ment requires not simply technologically and
organizationally viable ICT solutions, but also
a re-orientation of a company’s operations and referenceS
strategic focus in a way that assures that all op-
erations are customer centric and that customer- Agrawal, G. K., & Berg, D. (2007). Technology
relevant information is used to generate increased in the service development process: A missing
customer value, and thus to provide a sustainable dimension. International Journal of Services
and economically exploitable customer proposi- Technology and Management, 8(2/3), 107–122.
tion (Fellenz & Brady, 2008; Gulati & Oldroyd, doi:10.1504/IJSTM.2007.012863
2005; Shah et al., 2005). It is a unique challenge Ambler, T., (2004). Why Financial Managers Need
for functionally oriented decision makers such as To Think About Marketing, Corporate Finance
operations managers, technologists, marketers, or Review. Jul/Aug, 9(1), 14-21
finance and accounting staff to understand and
filter customer-level data to generate the customer Anderson, M., Banker, R., & Ravindran, S. (2006).
oriented information necessary to achieve this. Value Implications of Investments in Informa-
Developing and deploying the necessary skill sets tion Technology. Management Science, 52(9),
required for such customer centric information use 1359–11367. doi:10.1287/mnsc.1060.0542
would be a departure in virtually all traditional
service organizations where typical approaches
focus primarily on functional and operational
59
Managing Customer-Centric Information
Angeles, R. (2005). RFID technologies: Supply- Brady, M., O’Connor, M., & Saren, M. (2006,
chain applications and implementation issues. In- July). Marketers for the 21st Century Need ICT
formation Systems Management, 22(1), 51–61. d Education, In Academy of Marketing Conference,
oi:10.1201/1078/44912.22.1.20051201/85739.7 University of Middlesex, Brady, M., Saren, M., &
Tzokas, N., (2002). Integrating Information Tech-
Ayers, J., (2003, July). Don’t get buried in customer
nology into Marketing Practice: The IT Reality
data- use it. Harvard Business School Working
of Contemporary Marketing Practice. Journal of
Knowledge, July 21st.
Marketing Management, 18(5-6), 555–578.
Bednarz, A. (2001) Gartner: CRM deployment
Brethon, P., MacHulbert, J., & Pitt, L. (2005). Con-
plans holding steady, Computer World, September,
suming technology: Why marketers sometimes
http://www.computerworld.com/action/article.do
get it wrong . California Management Review,
?command=viewArticleBasic&articleId=64179
48(1), 110–128.
Berry, L., Shankar, V., Turner Parish, J., Cad-
Curran, J., & Meuter, M. (2005). Self-service tech-
wallader, S., & Dotzel, T. (2006). Creating New
nology adoption: comparing three technologies .
Markets Through Service Innovation, MIT . Sloan
Journal of Services Marketing, 19(2), 103–114.
Management Review, 47(2), 56–63.
doi:10.1108/08876040510591411
Bitner, M., J., Brown, S., Meuter, M. (2000). Tech-
Daft, R. L., & Lengel, R. H. (1984). Information
nology infusion in service encounters . Academy
richness: A new approach to managerial behafviour
of Marketing Science Journal., 28(1), 138–150.
and organization design. In B.M. Staw & L.L.
doi:10.1177/0092070300281013
Cummings (eds.), Research in organizational
Bitner, M. J. (2001). Self-service technologies: behaviour, 6, 191-233. JAI Press.
What do customers expect? Marketing Manage-
Daft, R. L., Lengel, R. H., & Trevino, L. K. (1987,
ment., 10(1), 10–12.
September). Message equivocality, media selec-
Brady, M. (2005, September). The role of in- tion, and manager performance: Implications for
formation technology in marketing: Crucial but information systems. MIS Quarterly, ▪▪▪, 355–366.
overlooked and underexploited. In Proceedings of doi:10.2307/248682
the Irish Academy of Management Conference,
Daft, R. L., & Macintosh, N. B. (1981). A tenta-
Galway, CD Rom.
tive explanation into the amount and equivocal-
Brady, M., & Fellenz, M. R. (2007, August), ity of information processing in organizational
The Service Paradox: Supporting Service Sup- work units. Administrative Science Quarterly,
ply Chains with Product-Orientated ICT’, IEEE/ 26, 207–224. doi:10.2307/2392469
Informs Soli International Conference on Service
Davenport, T. (2006). Competing on Analytics .
Operations, Logistics and Informatics, Philadel-
Harvard Business Review, (January): 99–107.
phia.
Davenport, T. H., & Harris, J. G. (2005). Au-
Brady, M., Fellenz, M. R., & Brookes, R.
tomated decision making comes of age. Sloan
(2008). The history of Information and Com-
Management Review, 46(4), 83–89.
munication Technologies (ICT) with the mar-
keting domain: Reframing the ICT dimension Day, G. S. (2006). Aligning the organization with
within the CMP framework . Journal of Busi- the market. Sloan Management Review, 48(1),
ness and Industrial Marketing, 23(2), 108–114. 41–49.
doi:10.1108/08858620810850227
60
Managing Customer-Centric Information
Drucker, P. (1954). The Practice of Management, Gulati, R., & Oldroyd, J. B. (2005). The quest
New York and Evanston: Harper & Row for customer focus. Harvard Business Review,
83(4), 92–101.
Fellenz, M., & Brady, M. (2008). Managing
the Innovative Deployment of Information and Gummesson, E. (2007). Exit services marketing
Communication Technologies (ICTs) for Global – enter service marketing . Journal of Consumer
Service Organizations. International Journal of Behaviour, 6(2), 113–142.
Technology Marketing, 3(1), 39–55. doi:10.1504/
Holland, C. P., & Naude, P. (2004). The
IJTMKT.2008.017339
metamorphosis of marketing into an informa-
Fellenz, M. R., Augustenborg, C., Brady, M., & tion-handling problem . Journal of Business
Greene, J. (2009). Requirements for an evolving and Industrial Marketing, 19(3), 167–177.
model of supply chain finance: A technology and doi:10.1108/08858620410531306
service providers perspective. In K.S. Soliman
Howard, M., & Worboys, C. (2003). Self-service
(ed.), Proceedings of the International Business
- a contradiction in terms or customer-led choice?
Information Management Conference: 1171-1179.
Journal of Consumer Behaviour, 2(4), 382–392.
Cairo, Egypt.
doi:10.1002/cb.115
Fisher, M., Raman, A., & McClelland, A. (2000).
Huber, G. P., & Daft, R. L. (1987). The information
Rocket science retailing is almost here - are
environment of organizations. In F. M. Jablin, L.
you ready? Harvard Business Review, 78(4),
L. Putnam, K. H. Roberts, & L. W. Porter (eds.),
115–124.
Handbook of organizational communication (pp.
Galbraith, J., R (2005) “Designing the Customer- 130-164). Newbury Park, CA: Sage.
Centric Organization: A Guide to Strategy,
Humby, C., Hunt, T., & Philips, T. (2008). Scor-
Structure, and Process, Jossey Bass Business and
ing points: How Tesco continues to win customer
Management Series
loyalty (2nd ed.). London, Kogan Page.
Glazer, R. (1991). Marketing in an information-
Jones, P., Clarke-Hill, C., Shears, P., Comfort,
intensive environment: Strategic implications
D., & Hillier, D. (2004). ‘Radio frequency
of knowledge as an asset. Journal of Marketing,
identification in the UK: Opportunities and
55(4), 1–19. doi:10.2307/1251953
challenges. International Journal of Retail &
Greenyer, A. (2006). Back from the grave: Distribution Management, 32(3), 164–171.
The return of modelled consumer infor- doi:10.1108/09590550410524957
mation . International Journal of Retail &
Kotler, P., Wong, S., & Armstrong, G. (2007).
Distribution Management, 34(3), 212–219.
Principles of Marketing, 12th International Edi-
doi:10.1108/09590550610654375
tion, London: Pearson.
Gronroos, C. (2006). On defining marketing: Find-
Levinson, M., (2003, December 1-12). The RFID
ing a new roadmap for marketing . MarketingTheory,
Imperative. CIO Magazine.
6, 395–417. doi:10.1177/1470593106069930
Levy, M., Powell, P., & Tetton, P. (2001). SMEs:
Gulati, R. (2007). Silo busting: How to execute on
Aligning IS and the strategic context. Jour-
the promise of customer focus. Harvard Business
nal of Information Technology, 16, 133–144.
Review, 85(5), 98–106.
doi:10.1080/02683960110063672
61
Managing Customer-Centric Information
Lin, J. S., & Hsieh, P. (2006). The role of technol- McHugh, G., Fahy, J., & Butler, P. (1998). Ac-
ogy readiness in customers’ perception and adop- countant behaving badly: A marketing perspective
tion of self-service technologies . International . Irish Marketing Review, 11(1), 19–26.
Journal of Service Industry Management, 17(5),
Meuter, M., Ostrom, A., Roundtree, R., & Bitner,
497. doi:10.1108/09564230610689795
M. J. (2000). Self-service technologies: Under-
Lurie, N., & Mason, C. (2007). Visual Repre- standing customer satisfaction with technology-
sentation: Implications for Decision Making . based service encounters . Journal of Marketing,
Journal of Marketing, 71, 160–177. doi:10.1509/ 64(3), 50–65. doi:10.1509/jmkg.64.3.50.18024
jmkg.71.1.160
Meyronin, B. (2004). ICT: the creation of
Marchand, D. A., Kettinger, W. J., & Rollins, J. value and differentiation in services. Man-
D. (2000). Information orientation: People, tech- aging Service Quality, 14(2/3), 216–225.
nology and the bottom line. Sloan Management doi:10.1108/09604520410528635
Review, (Summer): 69–79.
Mitchell, A. (2001). Radical Innovation.
Matthing, J., Kristensson, P., Gustafsson, A., BT Technology Journal, 19(4), 60–64.
& Parasuraman, A. (2006). Developing suc- doi:10.1023/A:1013730529933
cessful technology-based services: the issue
Myburgh, S. (2000). The convergence of infor-
of identifying and involving innovative users .
mation technology and information management.
Journal of Services Marketing, 20(5), 288–297.
Information Management Journal, 34(2), 4–16.
doi:10.1108/08876040610679909
Nadeem, M. (2007). Emergence of Customer-
McAfee, A. (2006). Mastering the Three Worlds
Centric Branding: From Boardroom Leadership to
of Information Technology. Harvard Business
Self-Broadcasting . Journal of American Academy
Review, 84(11), 141–149.
of Business, 12(1), 44–49.
McClune, J. (2003) Contentious Debate? It Works
Nolan, R. (1973). Computer data bases: The
at Philips: A technology powerhouse masters the
future is now. Harvard Business Review, 51(5),
“strategic conversation”, Interview Series, Mercer
98–114.
Management Journal, 16. Retrieved from http://
www.oliverwyman.com/ow/pdf_files/MMJ16_ Nolan, R. (1998, July-August 3-14). Connectivity
Interview_Contentious_Debate.pdf and control in the year 2000 and beyond. Harvard
Business Review.
McDonald, M., & Wilson, H. (1999). Improving
marketing effectiveness through IT. Cranfield Nonaka, I., & Takeuchi, H. (1995). The knowl-
Management Research Series - working paper, edge-creating company: How Japanese companies
(pp. 30-45). create the dynamics of innovation. New York:
Oxford University Press.
McGovern, G. (2000). Managing information
in the digital age: How the reader is king. Irish Nysveen, H., Pedersen, P., & Thorbjørnsen, H.
Marketing Review, 13(2), 55–61. (2005). Explaining intention to use mobile chat
services: moderating effects of gender . Jour-
McGovern, G., & Moon, Y.,(2007, June 2-7).
nal of Consumer Marketing, 22(5), 247–257.
Companies and the Customers Who Hate Them,
doi:10.1108/07363760510611671
Harvard Business Review.
62
Managing Customer-Centric Information
O’Connor, M., & Brady, M. (2006, September). Schweidel, D. A., Fader, P. S., & Bradlow, E. T.
The Hotel Sector In Ireland–Technology-Based (2008). Understanding Service Retention Within
Marketing Enterprises? Irish Academy of Manage- and Across Cohorts Using Limited Information.
ment Conference, University of Cork, Ireland. Journal of Marketing, 72(1), 82–94. doi:10.1509/
jmkg.72.1.82
Piercy, N., (1981) Marketing Information bridging
the quicksand between technology and decision- Shah, D., Rust, R., Parasumam, A., Stalin, R.,
making, The Quarterly Review of Marketing, & Day, G. (2006). The path to customer centric-
Fall,1-15. ity. Journal of Service Research, 9(2), 113–124.
doi:10.1177/1094670506294666
Prahalad, C. K., & Ramaswamy, V. (2003). The
new frontier of experience innovation, MIT . Sloan Sisodia, R. S. (1992). Marketing information
Management Review, 44(4), 12–18. and decision support systems for services.
Journal of Services Marketing, 6(1), 51–64.
Prahalad, C. K., & Ramaswamy, V. (2004). Co-
doi:10.1108/08876049210035773
creation experiences: The next practice in value
creation. Journal of Interactive Marketing, 18(3), Spekman, R., & Sweeney, P. (2006). RFID:
5–14. doi:10.1002/dir.20015 From concept to implementation. Interna-
tional Journal of Physical Distribution and
Ramaswamy, V. (2008). Co-creating value
Logistics Management, 36(10), 736–754.
through customers’ experiences: The Nike
doi:10.1108/09600030610714571
case. Strategy and Leadership, 36(5), 9–14.
doi:10.1108/10878570810902068 Srivastava, L. (2005, July). RFID and the internet
of things. Presented at ICT Trends and Challenges
Ramirez, R. (1999). Value co-production:
in the Global Era. International Telecommunica-
Intellectual origins and implications for
tion Union, Twist, D. C., (2005). The impact of
practice and research. Strategic Manage-
radio frequency identification on supply chain
ment Journal, 20(1), 49–65. doi:10.1002/
facilities. Journal of Facilities Management, 3(3),
(SICI)1097-0266(199901)20:1<49::AID-
226–236. doi:10.1108/14725960510808491
SMJ20>3.0.CO;2-2
Vargo, S. L., & Lusch, R. F. (2004). Evolving
Ranchhod, A. (2004). The changing nature
to a new dominant logic for marketing . Jour-
of cyber-marketing strategies. Business Pro-
nal of Marketing, 68(1), 1–17. doi:10.1509/
cess Management Journal, 10(3), 262–276.
jmkg.68.1.1.24036
doi:10.1108/14637150410539678
Vargo, S. L., & Lusch, R. F. (2008). Services Domi-
Reichheld, F. F., & Schefter, P. (2000). E-loyalty.
nant Logic, Continuing the evolution . Journal of
Harvard Business Review, 78(4), 105–113.
the Academy of Marketing Science, 36(1), 1–10.
Schultze, U., & Orlikowski, W. J. (2004). A Prac- doi:10.1007/s11747-007-0069-6
tice Perspective on Technology-Mediated Network
Venkatesh, V., Davis, F., & Morris, M. (2007).
Relations: The Use of Internet-Based Self-Serve
Dead Or Alive? The Development, Trajectory
Technologies. Information Systems Research,
And Future Of Technology Adoption Research.
15(1), 87–106. doi:10.1287/isre.1030.0016
Journal of the Association for Information Sys-
tems., 8(4), 267–287.
63
Managing Customer-Centric Information
Webster, F., & Malter, A., & Shankar Ganesan. Friend, S. C., & Walker, P. H. (2001). Welcome to
(2005). The Decline and Dispersion of the Mar- the new world of merchandising. Harvard Busi-
keting Competence, MIT . Sloan Management ness Review, 79(11), 5–11.
Review, 46(4), 35–43.
Frohlich, M. (2002). E-integration in the supply
Weick, K. E. (1995). Sensemaking in organiza- chain: Barriers and performance. Decision Scienc-
tions. Thousand Oaks, CA, Sage. es, 33(4), 537–557. doi:10.1111/j.1540-5915.2002.
tb01655.x
White, A. (2005). RFID: Why reusable asset
tracking is the best place to start. San Jose, CA: Loveman, G. (2003). Diamonds in the data mine.
BEA White Paper, BEA Systems Inc. Harvard Business Review, 81(5), 109–113.
Wind, Y. (2008). A plan to invent the Marketing O’Brien, T. V., Schoenbachler, D. D., & Gordon,
we need today . MIT Sloan Management Review, G. L. (1995). Marketing information systems for
49(4), 21–28. consumer products companies: A management
overview. Journal of Consumer Marketing, 12(5),
Womack, J. P., & Jones, D. T. (2005, March).
16–36. doi:10.1108/07363769510147777
Lean Consumption . Harvard Business Review,
58–68. Payne, A. (2006) Handbook of CRM, Oxford,
UK: Butterworth-Heinemann
addItIonal readIng
Key termS and defInItIonS
Andal-Ancion, A., Cartwright, P. A., & Yip, G. S.
(2003). The digital transformation of traditional Customer Centric Orientation: We define
businesses. Sloan Management Review, (Sum- customer centricity as reflecting a business model
mer): 34–41. that places customer value at the heart of all or-
ganizational value creation activities. This means
Cohen, W. M., & Levinthal, D. A. (1990). Absorp-
that all parts of the customer centric organizations
tive Capacity: A New Perspective on Learning and
are aware of how their activities directly and in-
Innovation. Administrative Science Quarterly,
directly contribute to (or detract from) the value
35(1), 128–152. doi:10.2307/2393553
that customers derive from their interaction with
Davenport, T. H., & Grover, V. (2001). ‘Special the company, and endeavor to maximize their
issue; Knowledge management. Journal of Man- contribution to the important outcome of customer
agement Information Systems, 18(1), 3–4. value creation. Therefore, customer centricity goes
beyond simple customer orientation.
Davenport, T. H., Harris, J. G., & Kohli, A. K.
Data Ambiguity: The degree of uncertainty
(2001). ‘How do they know their customers so
regarding the actual meaning of data.
well? Sloan Management Review, (Winter):
Data Equivocality: The number of different
63–73.
meanings that available data and information can
Fenn, J., & Linden, A. (2005). Gartner’s Hype validly support.
Cycle Special Report for 2005. Stamfort, CT: Gart-
ner, Inc. Retrieved February 14, 2008, from http://
www.gartner.com/resources/130100/130115/
gartners_hype_c.pdf
64
65
Chapter 4
Impact of Wireless Sensor
Network Technology on
Service Innovation in Supply
Chain Management
Gong Li
North Dakota State University, USA
Jing Shi
North Dakota State University, USA
aBStract
Driven by the rapid development of information and communication technologies (ICT) as well as today’s
globally competitive environment for enterprises, service innovation has drawn considerable attention
in such fields as supply chain management (SCM). Wireless sensor network (WSN) technology, which
can provide a mobile, scalable, and reliable monitoring solution, has gone through rapid development
in recent years. The objective of this chapter is to provide an overview about wireless sensor network
technology and a discussion on how this technology can be applied to modern industries and especially
bring service innovation to supply chain management. An overview of the history and potential appli-
cations of WSN is provided for the necessary background. The architecture, topology, standards, and
protocols of WSN are fundamentally important and thus introduced in details. In a general sense, the
impact of information technologies on supply chain management and service innovation is then briefly
discussed. After that, much emphasis is placed on the possibility, procedures, and critical challenges of
implementing WSN in supply chain management. In the end, two case studies are provided to illustrate the
application of WSN for service innovation in both cold chain management and healthcare settings.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
vibration, pressure, location or motion, at different applications in sensor networks. During the Cold
sites (Römer & Mattern, 2004, Haenselmann, War, the networks of air defense radars as well as
2006). Low-cost and smart devices with multiple a system of acoustic sensors on the ocean bottom
microsensors deployed in large numbers over wide called the Sound Surveillance System (SOSUS)
areas and networked through wireless links and were developed and deployed. From then on, many
the Internet can provide an unprecedented feasible more sophisticated sensor networks have been de-
tool for automatically monitoring, tracking, and veloped. Note that these sensor networks generally
controlling the entities of interest. adopt a hierarchical processing structure. In other
It has been well recognized that supply chain words, information is processed at consecutive
management and its service innovation are stra- levels until it reaches the user (Chong & Kumar,
tegically vital to corporate competitiveness and 2003). Modern research on sensor networks started
profitability in today’s operating environment in 1980s with the development of Distributed
(Burgess, 1998). Supply Chain Management Sensor Networks (DSN). The technology compo-
(SCM) offers a firm greater insights into potential nents for a DSN were identified in 1978, which
opportunities and threats that its supply chain may include acoustic sensors, communication under
carry by integrating supply and demand manage- high-level protocols, processing techniques and
ment within and across all supply chain organi- algorithms, and distributed software (Habermann,
zations. The successful coordination, integration 1978). Later, military systems soon utilized the
and management of key business processes across benefits of sensor networks to network-centric
the entire supply chain determine the ultimate warfare (Alberts, Garska, & Stein, 1999). In
success of all supply chain members. The main network-centric warfare, the mounted sensors and
goal of service innovation in SCM is to achieve weapons are controlled by separate platforms that
information sharing in SCM and reduction of to- operate independently but share information with
tal cost, thus improving operation efficiency and each other over a communication network. Sen-
enhancing competitive advantage. It is generally sor networks can provide multiple observations,
true that newer IT technologies can offer better extended detection range, faster response time,
services in managing the entire supply chain. With and the necessary redundancy for high reliability,
the recent development of WSN technology, WSN and thus the detection and tracking of objects
has shown its great potentials in different areas can be improved. It is well recognized that the
such as military sensing, environment monitor- development cost can be effectively lowered if
ing, traffic surveillance, object tracking, nuclear the commercial network technology and common
reactor control, fire/flood detection, etc. Therefore, network interfaces can be exploited.
it is necessary to evaluate how this state-of-art Wireless communication networks have a long
technology can be applied for service innovation history (Callaway, 2004). In 1920s, for example,
to reshape supply chain management. the U.S. Army Signal Corps established the War
Department Radio Net, a nationwide radiotele-
development of Wireless graphic network that was called the largest and
Sensor networks most comprehensive radio net of its kind in the
world (Raines, 1996). Later, the Transcontinental
As its name may imply, the development of Corps (TCC), a peer-to-peer network, was built to
wireless sensor networks is closely related to the facilitate communication among different area nets
advancements of sensing, wireless communica- in the United States, and this has become a basis
tion, and computing technologies. The research for the architecture of wireless sensor network
in sensor networks originated from the defense due to its low power ad hoc design and longevity
66
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
(Callaway, Hsu, & Shankar, 2002). The ALOHA been focusing on wireless, ad hoc networks for
system (Abramson, 1970) was developed by adopt- large distributed military sensor systems (http://
ing a random channel access protocol, which is www.darpa.mil/). A network of SensIT nodes can
generally recognized as the first successful wire- support detection, identification, and tracking of
less data communication network. Meanwhile, the threats, as well as targeting and communication,
amateur packet radio communications were also both within and outside the network.
developed, and this advanced the development WSN is attracting intensive research efforts
of the Multiple Access with Collision Avoidance due to easy deployment and a large variety of
(MACA) channel access protocol that employs a application scenarios. Typical state-of-art ef-
binary exponential random backoff mechanism forts on the prominent development of wireless
(Karn, 1990). In 1990, the 802.11 Working Group sensor networks include the Wireless Integrated
was established by the Institute of Electrical and Network Sensors (WINS) project (www.janet.
Electronics Engineers (IEEE) 802 LAN/MAN ucla.edu), the PicoRadio program (bwrc.eecs.
Standards Committee (LMSC). The first WLAN berkeley.edu) the μAMPS (ww-mtl.mit.edu),
standard was released in 1997, which enables the the Terminodes project (Hubaux et al., 2001),
data rates of 1 and 2 Mb/s. The 802.11 standard the Mobile Ad Hoc Networks (MANET) (www.
specifies the carrier sense multiple access with ietf.org), system-level aspects of wireless sensing
collision avoidance (CSMA/CA) channel access such as localization (Yun, Lee, Chung, Kim, &
method, which is a refinement of the MACA Kim, 2008), energy-efficiency (Ye, Heidemann, &
protocol (O’Hara & Petrick, 1999). In 1997, the Estrin, 2001; Anastasi, Conti, Francesco, & Pas-
Home RF Working Group was formed, followed sarella, 2009), novel and secure routing paradigms
by the formation of the Bluetooth Special Inter- (Rao, Papadimitriou, Shenker, & Stoica, 2003;
est Group in 1998 (Haartsen, 2000). Revision Karlof, & Wagner, 2003), Sensing coverage and
1.0 of both specifications was released in 1999, network connectivity(Ghosh & Das, 2008), and
representing the development of Wireless Personal data processing modules (Govindan, 2004; Cao,
Area Networks (WPANs). Chen, Zhang, & Sun, 2008).
Recent advances in wireless communica-
tion and computing techniques have resulted existing and future applications
in a significant development in wireless sensor
networks. However, it is urgently needed to find The earliest proposed uses of wireless sensor
new networking techniques suitable for highly networks were for military applications in which
dynamic ad hoc environments and information a variety of sensors, such as acoustic, vibration,
processing methods for extracting useful, reli- magnetic, and ultra wideband radar sensors, can
able, and timely information from the deployed be equipped (Horton et al., 2002). Inexpensive
sensor network. Low-cost sensors based on Micro- low-power processors, and inexpensive sensors
electro-mechanical system (MEMS) and nano- based upon MEMS and NEMS enable various
scale electromechanical systems (NEMS) start applications of wireless sensor networks. Current
to appear. Advances in IEEE 802.11a/b/g-based applications for wireless sensor networks include,
wireless networking and other wireless systems but are not limited to, military sensing and security
such as Bluetooth, ZigBee, and WiMax are now fa- control, environmental sensing, industrial moni-
cilitating reliable and ubiquitous connectivity. The toring, asset tracking and supply chain manage-
SensIT project launched by the Defense Advanced ment, health monitoring. Some examples of these
Research Projects Agency (DARPA) in 1998 has typical applications are listed as follows.
67
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
• Military applications: Monitoring inimical difficult to locate items in a large warehouse due
or friendly forces and equipment, monitor- to lack of record or misplacement, and this might
ing military-threat or battlefield surveil- lead to the loss of sales and wrong inventory de-
lance, targeting, battle damage assessment, cision. Wireless sensor networks can be used to
attack detection, etc. avoid this situation.
• Environmental applications: Monitoring Another market for wireless sensor networks
microclimates, forest fire detection, flood that is expected to grow quickly is in the field of
detection, etc. health monitoring (Lee & Chung, 2009). Health
• Health applications: Remote monitoring of monitoring is usually defined as “monitoring of
physiological data, tracking and monitor- non-life-critical health information,” to differenti-
ing doctors and patients inside a hospital, ate it from medical telemetry. Two general classes
drug administration, elderly assistance, of health monitoring applications are available
etc. for wireless sensor networks. One is athletic per-
• Home applications: home automation, in- formance monitoring, for example, tracking one
strumented environment, automated meter person’s pulse and respiration rate via wearable
reading, etc. sensors and sending the information to a personal
• Commercial applications: Environmental computer for later analysis (Berkowitz, 2001).
control in industrial and office buildings, The other class is at-home health monitoring, for
inventory control, vehicle tracking and de- example, personal weight management (Pärkkä et
tection, traffic flow surveillance, etc. al., 2002), daily blood sugar monitoring and remote
monitoring of patients with chronic disorders
An important application of wireless sensor (Lubecke & Lubecke, 2002), wearable personal
networks is object tracking, e.g., in supply chain health monitoring systems (Milenkovic, Otto, &
management. The use of wireless sensor net- Jovanov, 2006), etc.
works for the tracking of nuclear materials was
already realized in the Authenticated Tracking
and Monitoring System (ATMS) (Schoeneman & WIreleSS SenSor
Sorokowski, 1998). In a large distribution chain, netWorK technology
one of the most vexing problems facing the dis-
tributor is to track the flow of products quickly Wireless sensor networks are usually composed
and accurately. Real-time monitoring the product of many small low-complexity nodes that can sense
flow and even the condition of distribution in the local environment, communicate information
entire supply chain can help a business operate with neighboring nodes through wireless links,
more efficiently and effectively. The deployment and in many cases, perform basic computations
of wireless sensor network technology can bring on the data collected. The nodes themselves can
such benefits in this regard. Another example of be stationary or dynamic, homogeneous or het-
object tracking is to track the shipping containers erogeneous (Chong et al., 2003). Although the
in a large port, which may have tens of thousands wireless sensor networks for various applications
of containers, some being empty and in storage may be significantly different, they usually share
while others being bound for many different des- common technical issues such as general physical
tinations. The containers are stacked, both on land network structure, networking technologies, and
and on ship. By placing sensors on each container, communication protocols, etc.
its location can be determined. Also, it is often
68
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
69
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
70
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
exist four categories in terms of size, namely, A number of wireless COTS technologies are
large, small, microscopic, and nanoscopic; and two available for WSNs, such as Bluetooth (IEEE
categories in terms of mobility, namely, mobile, 802.15.1), ZigBee (IEEE 802.15.4 and UWB
and static (Sohraby, Minoli, & Znati, 2007). Sen- IEEE 802.15.4a), wireless LANs (WLAN, IEEE
sor nodes can be configured in various hardware 802.11a/b/g/n series), broadband wireless access
formats. They can either connect with a LAN (BWA)/WiMax (MAN-scope IEEE 802.16),
and permanent power sources or communicate radio-frequency identification (RFID) tagging,
via wireless multihop radio frequency (RF) radio and 3G. Each standard possesses different char-
powered by small batteries (Cornell Database acteristics, as summarized in Table 1.
Group, 2009). The trend is moving toward very ZigBee wireless technology is a short-range
large scale integration (VLSI), integrated opto- communication system for applications in wire-
electronics, and nanotechnology. less personal area networks. Mainly adopted in
The value of wireless sensor networks lies in the implementation of WSNs, ZigBee wireless
their low cost and distribution capability in large technology is characterized by its low complexity,
numbers. To enable the widespread and cost- low cost, low power consumption, low data trans-
effective deployment of WSN, certain features mission rate, and compatibility with cheap fixed or
of WSN should be standardized to make the mobile devices. The IEEE 802.15.4 standard only
products from different vendors compatible. For supports the data transmission rate ranging from
instance, the communication protocols should be 20 kbps to 250 kbps. However, it has the lowest
standardized for the various layers of wireless sen- power requirement among the above-mentioned
sor networks. Incompatible protocols, even they technologies. Most ZigBee devices can run several
might be optimal individually, will limit the size years on a single set of batteries. Bluetooth is a
of the overall wireless sensor market. Meanwhile, short-range communication protocol widely used
it is better to make use of existing and/or emerg- in mobile phones and PDAs. It usually operates
ing commercial off-the-shelf (COTS) wireless in the 2.4-GHz ISM band with a bandwidth of
communications and infrastructures rather than approximately 1~3 Mbps. WLAN is a collection
designing entirely new ones. of related 802.11 technologies that can operate
WMAN
WLAN (IEEE) WPAN (IEEE)
(IEEE)
Standards
802.11 802.15.1/ 802.15.4/ 802.16/
802.11a 802.11b 802.11g 802.11n
Legacy Bluetooth ZigBee WiMax
Release
1997 1999 1999 2003 2008 2002 2003,2006 2004,2005
Year
0.868
Frequency
2.4 5.8 2.4 2.4 2.4-5.8 2.4 0.915 2-66
Band (GHz)
2.4
Maximum
~70 ~100 ~100 ~110 ~160 ~10 ~100 ~50,000
Range (m)
Max data rate
2 54 11 54 248 3 250 134
(Mbps)
Number
Dozens Dozens Dozens Dozens Dozens Dozens Dozens Thousands
of users
71
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
in the 2.4-GHz ISM band, the 5-GHz ISM band, communication Protocols for WSns
or the 5-GHz UNII bands. It is well-known to
have the longest range of the common unlicensed Communication in wireless networks is performed
wireless technologies, and as rapid as a 54 Mbps via the electromagnetic signal transmission in the
data transmission rate. air, where the transmission medium is always
Recently, along with the successful deploy- expected to be fairly shared by all sensor network
ment of IEEE 802.11b/11g-based hotspot services nodes. A medium access control (MAC) protocol
(Wi-Fi) to support the Internet access and VoIP must be properly utilized in order to achieve this
applications (Minoli, 2002), the metro-wide goal. Meanwhile, energy efficiency is one of the
Internet/VoIP services using the newer WiMax most important goals in designing protocols for
connectivity have also been delivered, where wireless sensor networks. To do that, the protocols
WiMax is the marketing name of the IEEE should address the major sources of energy waste
802.16 standard. IEEE 802.16 protocol can pro- on MAC and routing levels.
vide very high capacity links on both the uplink
and downlink. Applications of WiMax include Medium Access Control Protocols
point-to-point communication between stations,
point-to-multipoint communication between In a WSN system, the physical layer typically in-
the base station and clients, backhaul services cludes a specification of the transmission medium
for Wi-Fi (802.11) hotspots, broadband Internet and the topology of the network. Generally, the
services to home users, private-line services for physical layer typically provides such services as
users in remote locations, and metro-wide WSN the encoding and decoding of signals, preamble
applications. generation and removal to achieve synchroniza-
Radio frequency identification (RFID) is a tion, and the transmission and reception of bits,
special form of wireless network technology. while the MAC layer must manage the commu-
Passive RFID tags (with no on-board battery) nication channels available for the node thereby
are powered by query RF signals from a reading reducing energy waste caused by collisions, idle
device and send back the ID information to the listening, overhearing, and excessive overhead.
reading device. Self-powered (active) tags can The MAC protocol is designed to regulate the
be read from a greater distance. Most RFID tags access to the shared wireless medium such that
have integrated circuits (ICs), microelectronic the performance requirements of the underlying
semiconductor devices with a large number of application are satisfied (van Dam & Langendoen,
interconnected transistors and other components. 2003). This objective of the MAC protocol is pro-
RFID can operate in low frequency (less than 100 vided by the lower sublayer of the data link layer
MHz), high frequency (more than 100 MHz), (DLL). The data link layer is necessary to accom-
and UHF (868 to 954 MHz). Presently, RFID is modate the logic required to manage the access to
mainly used for labeling and tracking, and thus a shared access communications medium.
low cost is the dominant factor for RFID tag Although many novel MAC protocols are still
design and manufacture. As a result, most RFID being developed (Ceken, 2008; Liao, & Wang,
tags carry no sensing capability and the tags can 2008; Kim, & Park, 2009), currently available
only communicate with the RFID readers and this protocols can generally be categorized into two
makes this technology simpler than the general- broad groups: schedule-based and contention-
purpose WSN. based MAC protocols. The schedule-based
protocols are a class of deterministic MAC layer
protocols in which the access to channel is based
72
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
on a schedule and limited to one sensor node at In WSNs, routing protocols are closely related
a time. This is achieved by pre-allocating the to information fusion because it addresses the
resources to individual sensor nodes. While with problem of delivering the sensed information to the
the contention-based MAC-layer protocols, a sink node. It is natural to think of performing the
single radio channel is shared by all nodes and fusion while the pieces of data become available.
allocated on demand. The contention-based MAC However, the way information is fused depends
layer protocols can only minimize, rather than on the network organization, which directly af-
completely avoid, the occurrence of collisions. To fects how the role can be assigned. Hierarchical
reduce energy consumption, these protocols differ networks are organized into clusters where each
in the mechanisms which reduce the likelihood node responds only to its respective cluster-head,
of a collision while minimizing overhearing and which might perform special operations such as
control traffic overhead. data fusion/aggregation. In flat networks, commu-
nication is performed hop-by-hop and every node
Routing Protocols may be functionally equivalent. Proper routing
can also overcome the limited processing, storage,
Routing realizes the process of sending a data data transmission capabilities resulting from cost-
packet from source to destination, during which effectiveness and sensor miniaturization. Although
intermediate nodes are often used before reaching the sensor nodes and communication links are
the final receiver. In WSNs, data communica- likely to fail due to these limitations and hostile
tion might be achieved from the sensor nodes operational environments, networking a large
to a monitoring node, among neighbor nodes, number of sensors together to form a distributed
or from a monitoring node to the sensor nodes. sensor network can overcome this weakness.
Data communication from the sensor nodes to a
monitoring node is the most common application.
On the other hand, information will be forwarded ServIce InovatIon In Scm
from a monitoring node to a set of sensor nodes and It technologIeS
if the information is needed to be sent to those
nodes, e.g., queries to the network. This section focuses on the impacts of modern
Many different routing strategies for WSNs Information technology (IT) including wireless
have been proposed, as surveyed by Akkaya & sensor networks on the service innovation in sup-
Younis (2005). These routing protocols can be ply chain management. The discussion starts with
divided into three broad types: flat-based routing, the relationship of IT adoption, service innovation,
hierarchical-based routing, and adaptive-based and competitive advantages in an organization.
routing. Flat-based routing assumes that all sen- An introduction is then provided on the general
sor nodes perform the same role, while nodes in role and importance of information technology
hierarchical-based routing have different roles in in supply chain management innovation. Also,
the network, static or dynamic. Adaptive routing the typical information technologies available
is characterized by automatically changing its presently for SCM innovation are summarized.
behavior according to the specific application and Finally, the possible benefits of applying WSN in
network conditions. These routing protocols can modern industries are briefly analyzed.
be further classified into multipath-based, query-
based, or negotiation-based routing techniques
depending on the protocol operation (Boukerche,
2008).
73
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
74
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
75
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
for the entire supply chain, not just for one stage. current It adoptions in
Supply chain management (SCM) has become Scm Innovation
a strategic tool vital to corporate competitiveness
and profitability in today’s global operating envi- Supply chain management innovation is rec-
ronment (Burgess, 1998). The key concept of SCM ognized as an important area for IT adoption
is to effectively manage the interconnection of and investment (Bowersox & Daugherty, 1995;
organizations through upstream and downstream Smirnov & Chandra, 2001; Lai et al, 2006). The
linkages between different processes that produce main goal is to achieve the information sharing in
value in the form of products and services to the SCM and reduction of total cost, thus improving
ultimate consumer (Slack, Chambers, & John- operation efficiency and enhancing competitive
ston, 2001). During the past decades, along with advantage. Indeed, a study report by Radjou
the increasing trend of globalization, companies (2003) indicates that U.S. manufacturers are
around the world have been driven to increasingly increasingly dependent on the benefits brought
integrate the supply chain and improve their sup- about by IT to improve supply chain agility, reduce
ply chain operations via the adoption of advanced cycle time, achieve higher efficiency, and deliver
information technology. products to customers in a timely manner.
The effective adoption of IT technology in With the progress in circuit miniaturization
supply chain management can have a significant and affordability, the general IT technology has
impact on supply chain performance. The appli- been gradually accepted in SCM applications.
cations of IT technologies, e.g., the development Numerous IT technologies have been success-
of inter-organizational information system for the fully applied for innovation to improve SCM
supply chain, can bring many distinct benefits performance such as bar code, data warehouse,
such as cost reduction, productivity improvement, Electronic Data Interchange (EDI), Radio Fre-
and product/market strategy optimization. IT quency Identification Technology (RFID), wire-
infrastructure capabilities provide a competitive less, the Internet and World Wide Web (WWW),
positioning of business initiatives such as reduc- and Information Systems (IS) such as Electronic
ing the production cycle time or inventory level, Commerce (E-Commerce) systems and Enter-
implementing the redesigned cross-functional prise Resource Planning (ERP) systems. For
processes. Companies must realize the power the purpose of brevity, a few representative IT
of IT in collaborating with their supply chain technologies are introduced as follows (Mishra,
partners. It is generally true that the newer IT 2006).
technologies can offer better services in manag-
ing the entire supply chain. However, it should • Bar codes and Scanners: A bar code is
be noted that, while selecting an IT system for a usually used to identify a specific kind of
company’s SCM innovation practice, the level of product and/or its manufacturer. Bar code
sophistication should be aligned with the needs scanners can be seen widely used, e.g., in
and its key success factors. super markets.
76
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
• Data warehouse: Data warehouse is a con- As a well known fact, another popular IT
solidated database maintained separately technology being adopted in SCM innovation is
from an organization’s production system RFID technology. Due to its decreasing cost, RFID
database. It organizes the time dependent has recently been introduced into the logistics
informational subjects rather than specific industry to enhance the operational efficiency
business processes. of supply chain management. An RFID system
• Electronic Data Interchange (EDI): combines various information technologies, such
EDI refers to the computer-to-computer as database management system and computer
exchange of business documents in a network, to provide an automatic, secure, and
standard format. EDI describes both the convenient real-time control system. The accuracy
capability and practice of sharing informa- and timeliness are two main concerns in the opera-
tion between organizations electronically. tion process control of supply chain management.
EDI is characterized by quicker process RFID technology can support real-time control of
to information, better customer service, goods in the supply chain including raw material,
reduced paper work, increased productiv- work in process (WIP), and finished product. It
ity, improved tracing and expediting, better can enhance the degree of automation, reduce the
cost efficiency, competitive advantage, and probability of error, and greatly improve the vis-
improved billing. EDI enables the supply ibility of supply chain. Thus, the RFID systems
chain partners to overcome the informa- can be used in the receiving and dispatching of
tion distortions and exaggeration by im- goods, stock management, theft prevention, prod-
proving technologies to facilitate the real uct assembly, and personnel control.
time sharing of actual demand and supply The range of applications of RFID technology
information. is far reaching, including logistics, retail, trans-
• Enterprise Resource Planning (ERP): portation industries, and health care. To name a
ERP system (e.g. SAP) has been viewed as few, Angeles (2005) proposed an application pro-
the core of a company’s IT infrastructure. cess of RFID system, which included five steps:
It has become an enterprise wide transac- estimate the ROI for RFID system, choose the
tion processing tool which captures the right RFID technology, anticipate RFID technical
data, and reduce the manual activities and problems, manage the IT infrastructure issues, and
tasks associated with processing financial, initiate a pilot project for learning experiences.
inventory and customer order information. Ngai, Cheng, Au, & Lai (2007) suggested that a
ERP system achieves a high level of in- system architecture integrating mobile commerce
tegration by utilizing a single data model and RFID applications in a container depot could
and establishing a set of rules for accessing keep track of the location of containers, provide
data. greater visibility of the operation data, and im-
• Electronic Commerce: Electronic com- prove the process control. Bose & Pal (2005)
merce represents various IT tools and discussed three-levels of Auto-ID technology
techniques utilized to conduct business in application in the supply chain management,
a paperless environment, including EDI, namely, the strategic level, the tactical level, and
e-mail, electronic fund transfers, electron- the operational level. Sabogal & Tholke (2004)
ic publishing, electronic bulletin boards, provided a guideline on the integration of RFID
shared databases and magnetic/optical data technology with the SAP ERP system for manu-
capture, etc. facture of pharmaceutical products. Adams &
77
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
Burke (2007) discussed about how RFID system to various environments and dynamic changes.
might be incorporated in the filtration phase of The flexibility of WSN is obvious in view that
the pharmaceutical product manufacturing. its sensing coverage can be adjusted by moving
or expanding nodes, that trade-off between delay
advantages of adopting and information accuracy can be made via col-
WSn in Industries laboration among sensors, and that balance of
power consumption between nodes can also be
The WSN technology has many advantages, such achieved by cooperation. Improved monitoring
as mobility, extendibility and ease of installation, capabilities and information quality can be at-
reliability and flexibility, improved monitoring tained by a WSN via the simple aggregation of
capabilities and information quality, etc (Ilyas & data from plenty of nodes.
Mahgoub, 2005). Note that the architecture of a As wireless networking technology advances,
distributed wireless sensor network is dependent it is also becoming more cost effective. The
on its specific application in some fields. size of sensor and the production costs are both
A dynamic or moving sensor can improve sys- decreasing. Recent advanced hardware technolo-
tem monitoring capabilities and achieve effective gies result in more powerful sensors as small as a
communication. In many cases, sensors need to be few millimeters volume. Current wireless sensor
deployed randomly rather than located precisely, networks are designed to ease development and
especially when the entity of interest cannot be well integration with other systems. No customization,
monitored based on the spatially fixed sensors. integration, or development is required, and there
Although currently most existing work focuses on are no wiring or installation costs. Battery-powered
the networks of fixed nodes, mobility has been motes do not require AC power, which can make
introduced into the sensor networks recently. Com- wireless networks suitable for locations where
pared with traditional ad hoc network or a wired power distribution is not designed for additional
sensor network, a WSN may provide much larger monitoring equipment.
overall coverage. The overall coverage area of a Along with the increasing importance of ser-
WSN is the union of many small coverage areas of vices in logistics and supply chain management,
low-cost sensors, so the coverage is more flexible the performance and efficiency of information
and can be conveniently adjusted or expanded by collection and data transmission become very
moving nodes or adding new nodes, respectively. critical. For example, companies in the food,
Wireless sensor networks are also characterized chemical, or pharmaceutical industries depend
by their adaptability and flexibility in monitoring on the monitoring of environmental conditions
and control applications. The capability and reli- such as temperature and humidity throughout the
ability of a single sensor node are restricted, but supply chain in order to prevent losses. A small,
multiple sensors will provide fault tolerance, thus low-power WSN can monitor the physical envi-
making the whole system robust and flexible. A ronment at high resolution and will lead to a vast
WSN is adaptable to the changes in the configura- increase in the quantity and quality of information
tion of equipment as well as in the layout of the available to organizations.
network itself. When a sensor dies, its neighbor Wireless sensor networks can be used for
nodes can provide the same or similar informa- process control and verification in transport and
tion. If some monitoring devices are taken away logistics processes. They can play an important
or break down, the network should reconfigure role in improving operational efficiency of supply
itself automatically. The self-organization feature chain management as well. It can be foreseen that
of sensor networks provides the adaptive agility the WSN technology will be applied in more ser-
78
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
vice industries. Real time location system (RTLS) tions and requirements, the general procedure is
will eventually be affordable and technically ap- similar, usually including deployment planning,
propriate for use in major supply chains where device configuration, performance validation,
it will locate things from a distance in real time and deployment completion (Huang, Lai, & Ku,
but, unlike WSN, they will not comprehensively 2006).
monitor conditions or have the other advantages
that attributed to WSN. Progress is now rapid and Deployment Planning
the much smaller size of the latest WSN devices
is one indication. While the original concept is An Internet backbone is made up of a large collec-
for billions or even trillions of tags the size of tion of interconnected high-capacity data routes
dust, the first ten years of development of WSN and core routers that carry data across the world.
has more often seen expensive tags – some of In the step of deployment planning, it should be
earlier products are close to the size of a video- determined first of all whether an Internet backbone
tape. Further miniaturization and cost reduction is necessary to be constructed for the specific WSN
are now imminent. application. After that, some fundamental issues
should be checked such as the network connectiv-
ity, the signal coverage in the area, and the number
aPPlIcatIonS of WSn of necessary devices, the layout of devices, etc.
In Scm InnovatIon For example, the network connectivity determines
whether the information packages can be success-
general deployment fully sent to their destination via the network. All
Procedure for WSn the devices in the backbone network should be
interconnected to construct a reliable network.
The deployment procedure is sometimes regarded
as the most important issue in the applications of Device Configuration
wireless sensor network (Karl et al 2000) since
most applications need certain infrastructure to The partitioning decisions to be made at the
achieve the data sensing, processing and com- beginning of WSN construction are complex. In
munication tasks with low power consumption. addition to the components of the communication
The traditional way in the deployment of WSN transceiver itself, the decision-maker must con-
is mostly placing sensor nodes in a random or ad sider the presence of any host processor that affects
hoc method which is convenient and suitable for hardware/software trade-offs, the type of power
outdoor applications (Heinzelman, Chandrakasan, source(s) available, and the type of interface(s)
& Balakrishnan, 2000, Younis, Youssef, & Arisha, needed to communicate with sensors and actua-
2002). In such cases, the sensor nodes are capable tors. One important but often overlooked factor
of self-configuration and self-discovery. In many in the design of wireless sensor network nodes
cases, however, to reduce power consumption, is the effect of the finite stability of the node
a reliable communication channel should be time base on the minimum attainable duty cycle,
considered and constructed before putting any and therefore, the minimum attainable average
application-oriented devices into action (Àlvarez power consumption of the network node. The
et al., 2004). resulting trade-off between the cost of the node
Although the deployment of WSN is quite time base and the attainable life of the battery (or
different from the wired network and different other power source) must be decided properly to
applications of WSN have their specific limita- achieve success.
79
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
Node implementation is of primary importance various standards bodies (e.g., Wi-Fi, Bluetooth,
in the design and deployment of a successful ZigBee, WiMax) can be used by way of employ-
wireless sensor network. To a large degree, the ing and/or integrating preconfigured chipsets and
practicality of a wireless sensor network node rests integrated circuits, antennas, drivers, and protocol
on its ability to meet the low power consumption machinery.
goals typically set by the specific application.
Low system power consumption depends on a Performance Validation
good match between the power source and the
load itself, so that significant amounts of power After the WSN system is constructed, the devel-
are not lost in conversion processes. The selec- opers will need to verify and validate the func-
tion of the power source itself is often the key to tionality and performance of the system such as
a successful implementation; the use of energy interconnectivity, network coverage, and device
scavenging is possible only with the low power coverage, etc. The network topology is formed
consumption. Meanwhile, antenna selection is as a tree, so by ensuring that each edge connec-
another design decision often overlooked. It is tion in the tree is valid, one can be sure that the
critical to the overall performance of the wireless network interconnection is valid. It means that if
sensor network node in that the antenna greatly all the devices are connected to their parents, they
affects the product cost, market flexibility, and are connected to all the devices in the network.
range of the node. The antenna design and selec- The purpose of parent connectivity testing is to
tion can also affect the external appearance of the retrieve the connection status between a device
node, and certainly has a major influence on the and its parent. Network coverage is used to verify
internal circuit board layout. In addition, since the coverage of the network in the target region.
wireless sensor network nodes are typically small, The purpose of the network coverage test is to
often exposed to the environment, employ small make sure that all packets from the target region
geometry CMOS integrated circuits, and may can be successfully sent to their destination. De-
have plastic housings to enable the use of internal vice coverage test aims to check the connection
antennas, the design consideration on electrostatic quality from a specific network device to some
discharge (ESD) protection is important. For the locations of interest.
products in nonconductive housings, ESD protec-
tion can be largely mechanical engineering task, Deployment Completion
with the goal of eliminating any holes or gaps in
the housing that may present a pathway for the If the wireless sensor network constructed ac-
discharge to reach the sensitive circuits. cording to the planning result does not meet the
Finally, much of the success of the wireless requirement, it might indicate that the network
sensor network application depends on standards, connectivity or the coverage of the network is not
so that nodes from multiple vendors can be in- valid to the applications to be applied upon the
teroperable. This will rescue the industry from its network structure. There are many reasons that
present state of very successful but incompatible could cause the incapability, such as incapable
proprietary communication protocols existing in space model, invalid antenna modal, theoretic
a number of niche markets, with their combined and realistic mismatch, and inaccurate device
volume too low to reach economies of scale planting location. Such problems must be fixed
needed for significant growth. The developers via certain tools or methods, for example, by
of WSN systems now need to determine which inserting additional devices to help detect the
off-the-shelf wireless systems already defined by problem. If the test result obtained from network
80
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
verification procedure reveals that the network plications as early as at the WSN design stage.
is too far from being capable, the users should Since the main functions of a sensor node are
reverse back to the planning procedure, modify event detection, local data processing, and data
some constraints or the space model, and repeat transmission, power consumption should be fo-
previous procedures. cused on the three functional domains. Various
power conservation mechanisms proposed in the
challenges in WSn applications literature (Liu, Zhao, Cheung, & Guibas, 2004;
Pantazis & Vergados, 2007; Anastasi et al, 2009)
WSN has become a most prospective IT technol- are either active or passive. Active power conserva-
ogy for service innovation of SCM in the near tion mechanisms achieve the energy conservation
future. To enable high performance of a WSN, by utilizing energy-efficient network protocols,
however, there still exist a number of challenging while passive power conservation mechanisms
issues in both research and practice. As mentioned save a node’s power by turning-off the transceiver
before, wireless sensor networks are featured by module whenever no data is to be received or
self-organizing capabilities, short-range wireless transmitted (Pantazis, Vergados, Vergados, &
communication and multihop routing, as well as Douligeris, 2009).
limitations in energy, transmit power, memory, While designing or constructing a WSN, a
and computing power. Therefore, before wireless critical behavior of batteries should be considered
sensor networks see their truly ubiquitous ap- is that a battery undergoing pulsed discharge gener-
plications, a number of hardware limitations and ally has a greater capacity than an identical battery
software constraints need to be overcome, which undergoing a constant discharge. Usually, the
include, but are not limited to, power efficiency, lower the duty cycles of the pulsed discharge, the
node costs, limited functional capabilities, trans- greater the battery capacity. The use of this charge
mission channels, topology management complex- recovery effect has been proposed as a method
ity and node distribution, standards, scalability of extending the battery life of portable commu-
concerns, etc. (Callaway, 2004, Sohraby et al., nication devices (Chiasserini & Rao, 2000). In
2007, Boukerche, 2008, Verdone et al., 2008). practice, taking advantage of the charge recovery
effect means that the protocol should activate high-
Power Efficiency power dissipation components (e.g., the sensor)
in infrequent bursts, resulting in a low duty cycle
Although it is possible to obtain energy from of operation. Also, the bursts should be separated
external power supply sources, e.g., solar cells from each other by the maximum extent possible,
(Want, Farkas, & Narayanaswami, 2005), a battery thereby giving the cell the maximum possible
is still necessary to be used since the supply of such time to recover before the next discharge pulse.
external power sources are often discontinuous or Besides, because the active power consumption
unsteady. That is, sensors are normally powered of the transceiver in a WSN node is much greater
by a battery which only has very limited power. than its standby power consumption, the node must
Therefore, energy conservation is one of the most operate its transceiver in a low duty cycle mode
crucial design issues in energy-constrained wire- to obtain low average power consumption.
less sensor networks since the network lifetime
directly relies on the efficient management of Cost Issues
sensing node energy both the behavior of the
power source and the power consumption of the The cost of hardware such as chips and external
system must be considered in the process of ap- parts in the physical layer is significant in the total
81
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
cost structure of WSN. A WSN usually consists they are out there in the “field”. Exchanges of loca-
of a large number of sensor nodes, indicating that tion information might cause attackers to identify
the cost of an individual node is critical to the total the node locations. An attacker could then disable
cost of the wireless sensor network. Obviously, the sensor node by draining the battery or physi-
the cost of each sensor node is expected to be as cally destructing the device. Furthermore, a node
low as possible while meeting the functionality can be compromised when the attacker subverts
requirements. Currently, sensors based on Blu- the sensor node to disrupt the network. Denial-
etooth technology (with limited bandwidth and of-service (DoS) attacks, which could diminish
distance) cost as low as $10/unit, and the price sensor network functionality, are analyzed in
keeps dropping. However, the cost of a sensor node details by Wood & Stankovic (2002). Meanwhile,
for massive deployment is generally targeted to be Karlof et al (2003) discussed various attacks and
less than $1, and this is still beyond the reach of countermeasures on WSN routing which include
the current state-of-the-art technology (Sohraby bogus routing information, selective forwarding,
et al, 2007). To reduce the cost, hardware inte- sinkholes, Sybil, wormholes and hello floods.
gration should be pursued in the design process. All these attacks are non-trivial to fix, especially
Certainly, a concurrent measure is to maximize when the routing protocols are designed without
market size, thus achieving cost reductions via any regard to security. Thus, a multi-fence secu-
volume production (Callaway, 2004). rity solution should be in place which could be
embedded into every component of the network.
Security Issues Table 2 summarizes these threats, the respective
requirements and possible solutions.
The sensor network consists of numerous mobile In brief, wireless sensor networks have prom-
sensor nodes organized in a flat or hierarchical ising potential for many applications. In the ab-
structure, making the sensor networks susceptible sence of adequate security, however, deployment
to more attacks than ordinary networks. Most of the of sensor networks is vulnerable to a variety of
services in WSNs are designed to be distributed, attacks. A sensor node’s limitations and nature
thus, security in WSNs should focus on dealing of wireless communication pose unique security
with various attacks, protecting confidentiality, in- challenges. Numerous on-going research works
tegrity, and availability of the communications and cover many different aspects of WSN security
computations. Threat analysis is needed based on such as group key management, key revocation,
multiple forms of active and passive attacks which link layer security, network layer security, secure
could happen in both routing and packet forward- localization, secure time synchronization, secure
ing. Routing attacks refer to advertising routing data aggregation, secure communication channels
updates that do not follow the specifications of (Husain et al, 2008). However, research toward
the routing protocol, whereas packet forwarding a complete secure sensor network is still in its
attacks cause the data packets to be delivered in infancy stage. For instance, a number of key
a way that is intentionally inconsistent with the management schemes have been proposed in
routing states. For passive attacks, illegitimate both distributed and hierarchical sensor networks
stealing and disclosure of information could easily (Lorincz et al., 2004; Liu, Ning, & Du, 2005, Du
take place since an attacker can eavesdrop on the et al., 2005), but the performance of those schemes
wireless communications. under various mobile scenarios has not been as-
Main security threats in WSN are related to ra- sessed. A fast, scalable, flexible and resilient key
dio links and sensor nodes. WSN security is closer management scheme for mobile sensor networks
to computer security than the Internet security. is urgently needed.
WSN nodes are typically easily accessed because
82
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
83
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
84
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
the products; (2) real-time monitoring environ- controller wirelessly. Environmental parameters
ment parameters; and (3) effective management are constantly collected by the wireless sensors
of the pedigree information. Being real-time is and sent to the controller. As shown in Figure 5,
important in that prompt response can be taken the controller also sends and receives informa-
to prevent the quality deterioration of products as tion via the cellular modem and cellular network
well as the spread of potential threats. For a gen- infrastructure, and thus establishes the connection
eral distribution chain, the stationary link points with a remote data server.
(stakeholders), which include manufacturers, To automatically identify each product that is
distribution centers, and retailers, are connected loaded into or unloaded from the truck container,
by transportation to achieve the flow of products. we employ the inexpensive passive UHF RFID
As shown in Figure 4, product monitoring is rela- technology. The product IDs will not be read
tively straightforward at these stationary stages. during transportation for system operation ef-
The inventory can be counted with the help of ficiency. Meanwhile, each wireless sensor node
identification technologies, and the measurement has the capability of “sense and send”, as well as
of environment parameters is feasible. Actions a unique ID, which acts as the liaison to connect
could also be taken immediately if environment with the product IDs during transportation. De-
conditions become out of control or any quality pending on the number of sensor nodes and their
problems are detected. reading ranges, the sensor nodes can be configured
Nevertheless, the complete visibility of the as a centralized structure so that all the data are
cold chain also relies on the monitoring of foods directly transmitted to the on-board controller; or
in transportation, in which the product informa- as a decentralized structure so that the information
tion and environmental parameters also need to can go through a route of multiple sensor nodes
be collected. This is critical because the potential before it reaches the controller.
threats can grow with poor environment control In brief, the devices used within the proposed
on carrier vehicles, and they could be spread solution to this application provide the following
geographically. As a result, on carrier vehicles, key capabilities:
wireless sensors and GPS receivers need to be
installed. The GPS receiver collects the location • Wireless Communication – real-time re-
information and can be interfaced with an onboard porting via global GSM cellular network.
• Identification and tracking – RFID systems
Figure 4. Schematic of cold chain management are incorporated for both item- and pallet-
level tracking.
• Temperature/Humidity Reporting – in-
tegration of wireless sensor nodes in the
carrier container to report environment
parameters.
• Door Security Monitoring – wireless or
wired door sensors that can detect proxim-
ity, light to determine if a door has been
opened.
• Location Reporting – integrated GPS re-
ceiver provides longitude/latitude coordi-
nates of the device.
85
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
In the e-pedigree building process, either cen- 5. Once the carrier vehicles arrive at the retailer,
tral or distributed repository concepts can be used. the pedigree information for the products
For a large scale cold chain, the latter concept is needs to be verified. If valid, this pedigree is
more suitable in that the information explosion can certified and indicates the authenticity. More
be more effectively handled. However, the former importantly, the data retrieved will include
is simpler to construct. Building the e-pedigree the entire temperature history, as well as the
begins from the manufacturer’s raw material sup- estimated shelf life. Retailer can therefore
plier (e.g. farm). To simplify the situation, we will make decision such as pricing.
start the process from the manufacturer.
tracking, Positioning, and condition
1. After packing the products and attaching monitoring in healthcare Industry
RFID tags, RFID readers capture all the tag
information and send it to the manufacturer’s Real-time collection and transmission and shar-
server and pass to the central server. ing as well as secure storage of patient data can
2. Carrier vehicles leave the manufacturer for significantly improve the quality, accuracy, and
the distribution center, during which product efficiency of the entire healthcare industry. Wire-
ID information is collected and environment less sensor network technology is a viable solution
conditions from wireless sensor nodes are for sensing and transmitting the data collected
transmitted to the central server via cellular from the physical entity and the environment,
network at constant time interval. Alarm will and thus a proper integration of wireless sensor
be issued if the control parameters are above networks with existing consumer electronic infra-
a threshold value. structures can assist in the tracking, positioning,
3. Once the carrier vehicles arrive at the dis- and condition monitoring of patients and the
tribution center, the validity of the goods relative areas of health care industry. As a result,
needs to be checked first. After verifying healthcare has become one of the most important
the pedigree, the distribution center adds and rapidly growing research and application
the data (shipping, ownership, dispatching areas for WSNs.
and etc) to its own server, then pass it to the During the past years, many advances from
central sever. research projects have been reported in this area.
4. Carrier vehicles leave the distribution center To name a few, MobiHealth (Konstantas, Jones,
for the retailer, during which similar opera- & Herzog, 2002) is a system based on 2.5~3G
tions as Step 2 are performed. technologies, integrating the sensors and actuators
86
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
into a wireless body area network. The sensors enhance the first responders’ ability of assessing
and actuators can continuously sense and transmit patients where they are found, ensure a seamless
vital data to health service providers. Ubiquitous transfer of data among healthcare personnel, and
monitoring environment for wearable and implant- facilitate efficient allocation of hospital resources.
able sensors (UbiMon) (Ng et al., 2004) is a system Similarly, PPMIM (Jea & Srivastava, 2006)
architecture composed of five major components, represents remote medical monitoring three-tier
namely, the body sensor network nodes, the lo- architecture with a GSM/GPRS peer-to-peer chan-
cal processing unit, the central server, the patient nel. In the MobiCare project (Chakravorty, 2006),
database, and the workstation. The data measured short-range Bluetooth technology is adopted for
by independent nodes on a patient measure are the wireless communication between a body
transmitted to the local processing unit (such as sensor network (BSN) and BSN managers, and
a PDA) and then forwarded to the central server GPRS/UMTS cellular networks between BSN
via Bluetooth/Wi-Fi or cellular networks. Scal- Managers and health-care providers. Besides,
able medical alert response technology (SMART) Baker et al. (2007) introduced several prototypes
(Waterman et al., 2005) is a system for patient for home health monitoring systems and analyzed
tracking and monitoring during the entire process the enabling technologies for automated home
of transporting the patient from their previous health monitoring. Dağtaş, Pekhteryev, Şahinoğlu,
location to the healthcare facilities. The system Çam, & Challa (2008) present a ZigBee-based
is based on a scalable location-aware monitor- wireless communication system for real-time
ing architecture, with remote transmission from health monitoring with secure transmission ca-
medical sensors and display of information on pability. A comprehensive system architecture
PDAs. Patients, medical equipment, healthcare for sensor networks in various healthcare settings
providers are located by SMART on demand. is proposed in (Ng, Sim, & Tan, 2006), and it is
CodeBlue (Lorincz et al., 2004) is a wireless shown in Figure 6.
infrastructure integrating low-power, wireless In addition, Hao & Foster (2008) provided
vital sign sensors, personal digital assistants a good review on the wireless body sensor net-
(PDAs), and PC-class systems, which aims to works for health-monitoring applications. The
Figure 6. System architecture of wireless sensor networks in healthcare industry (Ng et al., 2006)
87
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
system employs various wireless sensor nodes nization. Service innovation in SCM is urgently
to measure the patient’s physiological data and needed by adopting the rapid development of
wirelessly communicate with the network base information and communication technologies
unit, e.g., a wireless network coordinator con- (ICTs) since ICT adoptions have significant im-
nected to a monitoring and control terminal where pacts on the entire service processes of the supply
the physiological data can be stored, analyzed, chain. Supply chain management innovation is
and displayed at demand. The base unit can also recognized as an important area for ICT adoption
function as a gateway to other networks such as and investment. Integrating the supply chain via
GPRS, WLAN, or the Internet, thus enabling adoption of advanced information technology
remote real-time processing or storage of the can achieve information sharing and reduction
physiological data. of total cost, thus improving operation efficiency
The potential benefits which will stimulate and enhancing competitive advantage. The use of
the research advancement and accelerate the information technology in managing the supply
deployment of WSNs in healthcare applications chain process has thus drawn increasing attention
are summarized as follows (Ng et al., 2006, Hao in the corporate world.
et al., 2008). With many innovative IT technologies putting
into SCM application practices recently, increas-
• Faster, lower cost of care delivery, ing research attentions have been directed toward
• Convenient access to the latest patient data wireless sensor networks. Identified as one of key
with high accuracy, technologies for the 21st century, wireless sensor
• Enabled individual health monitoring sys- network has many advantages, such as mobility,
tems to shift the healthcare expenditure, extendibility, reliability and ease of installation.
• Reduced risk of infection and/or failure, Wireless sensor networks provide adaptive moni-
• Enhanced mobility and usability. toring systems with the flexibility and adaptability
needed in an organization’s monitoring and control
However, since the information regarding the strategy. Wireless motes are placed where needed
health of an individual is private and highly sensi- without the need of specialized RF skills or site
tive, it is of paramount importance to defend the surveys, while the network handles the rest such
network against any illegal access and malicious as wireless connectivity, routing redundancy, and
attacks to the entire system. It can he foreseen that, frequency agility. Additionally, these networks are
in the near future, such systems will be further adaptable to changes in both the configuration of
improved and see a widely deployment in the equipment on the plant floor and in the layout of
healthcare industry. the network itself. If monitoring devices are added
or removed, the network simply reconfigures itself
automatically.
Summary and ProSPectIve As wireless networking technology advances,
it is also becoming more cost effective. The size
Supply chain management (SCM) has become a of sensors and the production costs are both de-
strategic tool vital to corporate competitiveness creasing. Current wireless sensor networks are
and profitability. Along with globalization and designed to ease development and integration with
increasing competition, the performance and other systems. No customization, integration, or
efficiency of information collection, storage, development is required, and there are no wiring
processing and sharing have become critical for or installation costs. Battery-powered motes make
SCM as well as other key activities of an orga- wireless networks suitable for locations where
88
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
power distribution is not designed for additional Àlvarez, C., et al. (2004). Efficient and reliable high
monitoring equipment. It can be foreseen that the level communication in randomly deployed wire-
WSN technology will be applied in more service less sensor networks. In Proceedings of the second
industries. However, the WSN technology is just international workshop on Mobility management &
emerging from academic research into commercial wireless access protocols (pp. 10information and
application, many areas or aspects need further communication technologies (ICTs)Information
investigation, such as MAC protocols in the technologyOperating system (OS)6-110).
Industrial, Scientific, and Medical (ISM) bands,
Anastasi, G., Conti, M., Francesco, M., & Pas-
safer routing algorithms, security and privacy
sarella, A. (2009). Energy conservation in wireless
issues as well as the hardware.
sensor networks: A survey. Ad Hoc Networks, 7(3),
537–568. doi:10.1016/j.adhoc.2008.06.003
referenceS Angeles, R. (2005). RFID technologies: supply-
chain applications and implementation issues.
Abramson, N. (1970). The ALOHA System - An- Information Systems Management, 22(1), 51–65.
other alternative for computer communications. doi:10.1201/1078/44912.22.1.20051201/85739.7
In Proceedings of AFIPS Fall Joint Computation
Conference, 37, 281-285. Retrieved from http:// Anonymous, . (2003). 10 emerging technologies
doi.acm.org/10.1145/1478462.1478502 that will change the world. MIT’s Technology Re-
view, 106(1), 33–49.
Adams, G. (2007). Pharmaceutical manufactur-
ing: RFID-reducing errors and effort. Filtration Baker, C. R., et al. (2007). Wireless sensor networks
& Separation, 44(6), 17–19. doi:10.1016/S0015- for home health care. In Proceedings of the 21st
1882(07)70179-9 International Conference on Advanced Informa-
tion Networking and Applications Workshops, 2,
Agarwal, R., & Sambamurthy, V. (2002). Prin- 832-837.
ciples and models for organizing the information
technology function. MIS Quarterly Executive, Berkowitz, B. (2001, April 20). Technology catches
1(1), 1–16. up to runners. Washington Post, sec. E, pg.1.
Akkaya, K., & Younis, M. (2005). A survey on Berry, L. L., Shankar, V., Parish, J. T., Cadwallader,
routing protocols for wireless sensor networks. S., & Dotzel, T. (2006). Creating new markets
Ad Hoc Networks, 3(3), 325–349. doi:10.1016/j. through service innovation. Sloan Management
adhoc.2003.09.010 Review, 47(2), 56–63.
Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., Bhatt, G., & Grover, V. (2005). Types of information
& Cayirci, E. (2002). A survey on sensor net- technology capabilities and their role in competitive
works. Communications Magazine, IEEE, 40(8), advantage: an empirical study. Journal of Manage-
102–114. doi:10.1109/MCOM.2002.1024422 ment Information Systems, 22(2), 253–277.
Alberts, D. S., Garska, J. J., & Stein, F. P. (1999). Bose, I., & Pal, R. (2005). Auto-id: managing
Network Centric Warfare: Developing and Lever- anything, anywhere, anytime in the supply chain.
aging Information Superiority. Retrieved April Communications of the ACM, 48(8), 100–106.
2, 2009, from http://www.nps.edu/Academics/ doi:10.1145/1076211.1076212
Centers/CEP/docs/Alberts_NCW.pdf
89
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
Boukerche, A. (2008). Algorithms and protocols Chen, J. S., & Tsou, H. T. (2007). Information tech-
for wireless sensor networks. New York: John nology adoption for service innovation practices
Wiley & Sons. and competitive advantage: the case of financial
firms. Information research: an international
Bowersox, D. J., & Daugherty, P. J. (1995).
electronic journal, 12(3), 314. Retrieved April
Logistics paradigms: the impact of information
3, 2009, from http://InformationR.net/ir/12-3/
technology. Journal of Business Logistics, 16(1),
paper314.html
65–80.
Chen, R., Sun, C., Helms, M., & Kennyjih, W.
Burgess, R. (1998). Avoiding supply chain
(2008). Aligning information technology and
management failure: lessons from business
business strategy with a dynamic capabilities
process re-engineering. International Jour-
perspective: A longitudinal study of a Taiwanese
nal of Logistics Management, 9(1), 15–23.
semiconductor company. International Journal
doi:10.1108/09574099810805717
of Information Management, 28(5), 366–378.
Business Week. (1999, August 30). 21 ideas for doi:10.1016/j.ijinfomgt.2008.01.015
the 21st century. Retrieved April 1, from http://
Chiasserini, C. F., & Rao, R. R. (2000). Rout-
www.businessweek.com/1999/99_35/2121_con-
ing protocols to maximize battery efficiency. In
tent.htm
Proceedings of MILCOM: 21st Century Military
Callaway, E., Hsu, S., & Shankar, R. (2002). JAN: Communications Conference, 1, 496-500.
A communications model for wireless sensor net-
Chong, C. Y., & Kumar, S. P. (2003). Sensor Net-
works, Technical Report, TR-CSE-02-12, Boca
works: Evolution, Opportunities, and Challenges.
Raton, FL: Department of Computer Science and
Proceedings of the IEEE, 91(8), 1247–1256.
Engineering, Florida Atlantic University.
doi:10.1109/JPROC.2003.814918
Callaway, E. H. (2004). Wireless sensor net-
Chris, K., Naveen, S., & David, W. (2004). Tiny-
works: architectures and protocols. New York:
Sec: a link layer security architecture for wireless
CRC Press.
sensor networks. In Proceedings of the 2nd In-
Cao, X., Chen, J., Zhang, Y., & Sun, Y. (2008). ternational Conference on Embedded Networked
Development of an integrated wireless sensor Sensor Systems, New York: ACM Press.
network micro-environmental monitoring system.
Cornell Database Group. (2009). Cougar: The
ISA Transactions, 47(3), 247–255. doi:10.1016/j.
Network Is the Database. Retrieved April 2,
isatra.2008.02.001
2009, from http://www.cs.cornell.edu/bigreddata/
Ceken, C. (2008). An energy efficient and delay cougar/index.php
sensitive centralized Mac protocol for wireless sen-
Currie, W. (1996). Organizational structure and
sor networks. Computer Standards & Interfaces,
the use of information technology: Preliminary
30(1-2), 20–31. doi:10.1016/j.csi.2007.06.001
findings of a survey in the private and public
Chakravorty, R. (2006). A programmable service sector. International Journal of Information
architecture for mobile medical care. In Pro- Management, 16(1), 51–64. doi:10.1016/0268-
ceedings of the 4th Annual IEEE International 4012(95)00061-5
Conference on Pervasive Computing and Com-
munications Workshops (PerCom ‘06), pages
532-536.
90
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
Dağtaş, S., Pekhteryev, G., Şahinoğlu, Z., Çam, Gaynor, M., Moulton, S., Welsh, M., Rowan, A.,
H., & Challa, N. (2008). Real-Time and Secure LaCombe, E., & Wynne, J. (2004). Integrating
Wireless Health Monitoring. International Journal Wireless Sensor Networks with the Grid. IEEE
of Telemedicine and Applications, 2008, Article Internet Computing, 8(4), 32–39. doi:10.1109/
ID 135808, 10 pages MIC.2004.18
Davenport, T., Hammer, M., & Metsisto, T. (1989). Ghosh, A., & Das, S. (2008). Coverage and con-
How executives can shape their companies’ in- nectivity issues in wireless sensor networks: A
formation systems. Harvard Business Review, survey. Pervasive and Mobile Computing, 4(3),
67(5), 130–134. 303–334. doi:10.1016/j.pmcj.2008.02.001
Demirhan, D., Jacob, V., & Raghunathan, S. Govindan, R. (2004). Datacentric routing and
(2006). Information technology investment strat- storage in sensor networks. In Znati, T., Sival-
egies under declining technology cost. Journal ingam, K., & Raghavendra, C.S. (eds.), Wireless
of Management Information Systems, 22(3), sensor networks (pp.185-205). Boston: Kluwer
321–350. doi:10.2753/MIS0742-1222220311 Academic Publishers.
Du, W. (2005). A pairwise key predistribution Grover, V., Fiedler, K. D., & Teng, J. T. C. (1999).
scheme for wireless sensor networks. ACM Trans- The role of organizational and information tech-
actions on Information and System Security, 8(2), nology antecedents in reengineering initiation
228–258. doi:10.1145/1065545.1065548 behavior. Decision Sciences, 30(3), 749–781.
doi:10.1111/j.1540-5915.1999.tb00905.x
Dutertre, B., Cheung, S., & Levy, J. (2004).
Lightweight key management in wireless sensor Haartsen, J. C. (2000). The Bluetooth radio system.
networks by leveraging initial trust. Technical IEEE Personal Communications, 7(1), 28–36.
Report SRI-SDL-04-02. Retrieved April 3, 2009, doi:10.1109/98.824570
from http://www.csl.sri.com/users/bruno/publis/
Habermann, A. W. (1978). Dynamically Modi-
sri-sdl-04-02.pdf
fiable Distributed Systems. In Proceedings of
Elson, J., Girod, L., & Estrin, D. (2002). Fine- a Workshop on Distributed Sensor Nets (pp.
grained network time synchronization using 111-114). Pittsburgh, PA: Carnegie Mellon Uni-
reference broadcasts. ACM SIGOPS Operating versity.
Systems Review, 36(SI), 147-163.
Haenselmann, T. (2006). Sensornetworks. GFDL
Fichman, R. G. (2001). The role of aggregation Wireless Sensor Network textbook. Retrieved
in the measurement of information technology- April 2, 2009, from http://www.informatik.uni-
related organizational innovation. MIS Quarterly, mannheim.de/~haensel/sn_book
25(4), 427–455. doi:10.2307/3250990
Hao, Y., & Foster, R. (2008). Wireless body
Fink, L., & Neumann, S. (2009). Exploring sensor networks for health-monitoring applica-
the perceived business value of the flexibility tions. Physiological Measurement, 29, 27–56.
enabled by information technology infrastruc- doi:10.1088/0967-3334/29/11/R01
ture. Information & Management, 46(2), 90–99.
doi:10.1016/j.im.2008.11.007
91
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
Harrop, P., & Das, R. (2009). Wireless Sensor Net- Karl, H., & Willig, A. (2003). A short survey of
works 2009-2019: The new market for ubiquitous wireless sensor networks, TKN technical report
sensor networks (USN). Retrieved April 3, 2009, TKN-03-018. Retrieved April 3, 2009, from
from ID http://www.idtechex.com/research/reports/ http://www.tkn.tu-berlin.de/publications/papers/
wireless_sensor_networks_2009_2019_000212. TechReport_03_018.pdf
asp
Karlof, C., & Wagner, D. (2003). Secure rout-
Heinzelman, W., Chandrakasan, A., & Balakrish- ing in wireless sensor networks: attacks and
nan, H. (2000). Energy-efficient communication countermeasures. In Sensor Network Protocols
protocol for wireless sensor networks. In Proceed- and Applications, 2003. Proceedings of the First
ing of the 33rd Hawaii International Conference on IEEE. 2003 IEEE International Workshop on,
System Science, 8, 8020. (pp. 113-127).
Hill, J. (2000). System architecture directions for net- Karn, P. (1990). MACA - A new channel access
worked sensors. SIGOPS Operating Systems Review, method for packet radio. ARRL/CRRL Amateur
34(5), 93–104. doi:10.1145/384264.379006 Radio 9th Computer Networking Conference ap-
pears in (pp. 134-140). London: ARRL.
Horton, M.A. (2002). Deployment ready multimode
micropower wireless sensor networks for intrusion Kim, J., & Park, K. H. (2009). An energy-efficient,
detection, classification, and tracking. Proceedings transport-controlled Mac protocol for wireless
of the Society for Photo-Instrumentation Engineers, sensor networks. Computer Networks, 53(11),
4708, 290–295. 1879–1902. doi:10.1016/j.comnet.2009.03.002
Huang, T. C., Lai, H. R., & Ku, C. H. (2006). A Konstantas, D., Jones, V., & Herzog, R. (2002).
deployment procedure for wireless sensor networks. Mobihealth - innovative 2.5 / 3g mobile services
Retrieved April 5, 2009, from: http://acnlab.csie. and applications for healthcare. Retrieved April
ncu.edu.tw/wasn06/CR2/p19.pdf 5, 2009, from http://aps.ewi.utwente.nl/public/
bibliografie/Thessaloniki.pdf
Hubaux, J. P. (2001). Toward self-organized
mobile ad hoc networks: the Terminodes proj- Lacoss, R., & Walton, R. (1978). Strawman design
ect . IEEE Communications, 39(1), 118–124. for a DSN to detect and track low flying aircraft.
doi:10.1109/35.894385 In Proceedings of 1978 Distributed Sensor Nets
Conference on, (pp. 41-52).
ITAA. (n.d.). Information technology definition
aggregation.Retrieved April 3, 2009, from itaa Web LaFollette, R. M. (1995). Design and performance
site: http://www.itaa.org/es/docs/Information%20 of high specific power, pulsed discharge, bipolar
Technology%20Definitions.pdf lead acid batteries. In Proceedings of the 10th
Annual Battery Conference on Applications and
Iyengar, S. S., & Brooks, R. R. (2004). Distributed
Advances, 43-47.
sensor networks. Boca Raton, FL: Chapman &
HalVCRC. Lai, K.-H., Wong, C. W., & Cheng, E. T. C. (2006).
Institutional isomorphism and the adoption of
Jea, D., & Srivastava, M. B. (2006). A remote
information technology for supply chain man-
medical monitoring and interaction system. In
agement. Computers in Industry, 57(1), 93–98.
Proceedings of the 4th International Conference
doi:10.1016/j.compind.2005.05.002
on Mobile Systems, Applications, and Services
(MobiSys ‘06), Uppsala, Sweden.
92
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
Lansford, J., & Bahl, P. (2000). The design and Lubecke, O. B., & Lubecke, V. M. (2002). Wireless
implementation of HomeRF: a radio frequency house calls: using communications technology for
wireless networking standard for the connected health care monitoring . IEEE Micro, 3(3), 43–48.
home . Proceedings of the IEEE, 88(10), 1662– doi:10.1109/MMW.2002.1028361
1676. doi:10.1109/5.889006
Mabert, V. A., & Venkataramanan, M. A. (1998).
Lee, Y.-D., & Chung, W.-Y. (2009). Wireless Special research focus on supply chain linkages:
sensor network based wearable smart shirt for Challenges for design and management in the
ubiquitous health and activity monitoring. Sensors 21st century. Decision Sciences, 29(3), 537–552.
and Actuators. B, Chemical, 140(2), 390–395. doi:10.1111/j.1540-5915.1998.tb01353.x
doi:10.1016/j.snb.2009.04.040
McLaughlin, S., Paton, R. A., & Macbeth, D. K.
Liao, S., Chem, Y., Liu, F., & Liao, W. (2004). (2006). Managing change within IBM’s complex
Information technology and relationship man- supply chain . Management Decision, 44(8),
agement: a case study of Taiwan’s small manu- 1002–1019. doi:10.1108/00251740610690586
facturing firm. Technovation, 24(2), 97–108.
Milenkovic, A., Otto, C., & Jovanov, E. (2006).
doi:10.1016/S0166-4972(02)00037-8
Wireless sensor networks for personal health
Liao, W., & Wang, H. (2008). An asynchronous monitoring: Issues and an implementation. Com-
Mac protocol for wireless sensor networks. Jour- puter Communications, 29(13-14), 2521–2533.
nal of Network and Computer Applications, 31(4), doi:10.1016/j.comcom.2006.02.011
807–820. doi:10.1016/j.jnca.2007.07.001
Minoli, D. (2002). Hotspot networks: Wi-Fi for
Lin, L. C. (2009). An integrated framework for public access locations. New York: McGraw-
the development of radio frequency identification Hill.
technology in the logistics and supply chain man-
Mishra, R. K. (2006). Role of information tech-
agement. Computers & Industrial Engineering,
nology in supply chain management. Retrieved
57(3), 832–842. doi:10.1016/j.cie.2009.02.010
April 1, 2009, from www.indianmba.com/Fac-
Liu, D., Ning, P., & Du, W. (2005). Group-based ulty_Column/FC461/fc461.html.
key pre-distribution in wireless sensor networks.
Ng, H. S., Sim, M. L., & Tan, C. M. (2006). Security
ACM Transactions on Sensor Networks, 4(2),
issues of wireless sensor networks in healthcare
11.
applications. BT Technology Journal, 24(2),
Liu, J., Zhao, F., Cheung, P., & Guibas, L. (2004). 138–144. doi:10.1007/s10550-006-0051-8
Apply geometric duality to energy-efficient
Ng, J. W. P., et al. (2004). Ubiquitous monitoring
non-local phenomenon awareness using sensor
environment for wearable and implantable sensors
networks. Wireless Communications, IEEE, 11(6),
(UbiMon). In Proceedings of the 6th International
62–68. doi:10.1109/MWC.2004.1368898
Conference on Ubiquitous Computing (UBICOMP
Lorincz, K. (2004). Sensor networks for emer- ‘04), Nottingham, UK.
gency response: challenges and opportunities.
Ngai, E. W. T., Cheng, T. C. E., Au, S., & Lai,
Pervasive Computing, IEEE, 3(4), 16–23.
K. (2007). Mobile commerce integrated with
doi:10.1109/MPRV.2004.18
RFID technology in a container depot. Decision
Support Systems, 43(1), 62–76. doi:10.1016/j.
dss.2005.05.006
93
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
O’Hara, B., & Petrick, A. (1999). The IEEE 802.11 Rao, A., Papadimitriou, C., Shenker, S., & Stoica,
Handbook: A Designer’s Companion. New York: I. (2003). Geographic routing without location
IEEE Press. information. In Proceedings of the 9th Annual
International Conference on Mobile Computing
Palmer, J. W., & Markus, L. M. (2000). The and Networking on, (pp.96-108).
performance impacts of quick response and stra-
tegic alignment in specialty retailing. Information Römer, K., & Mattern, F. (2004). The design
Systems Research, 11(3), 241–259. doi:10.1287/ space of wireless sensor networks. IEEE Wire-
isre.11.3.241.12203 less Communications, 11(6), 54–61. doi:10.1109/
MWC.2004.1368897
Pantazis, N. A., & Vergados, D. D. (2007). A survey
on power control issues in wireless sensor networks. Rubery, J., Earnshaw, J., Marchington, M., Cooke,
Communications Surveys & Tutorials, IEEE, 9(4), F. L., & Vincent, S. (2002). Changing organiza-
tional forms and the employment relationship.
86–107. doi:10.1109/COMST.2007.4444752
Journal of Management Studies, 39(5), 645–672.
Pantazis, N. A., Vergados, D. J., Vergados, D. D., doi:10.1111/1467-6486.00306
& Douligeris, C. (2009). Energy efficiency in
Ruizmercader, J., Meronocerdan, A., & Sabatersan-
wireless sensor networks using sleep mode TDMA
chez, R. (2006). Information technology and learn-
scheduling. Ad Hoc Networks, 7(2), 322–343. ing: Their relationship and impact on organizational
doi:10.1016/j.adhoc.2008.03.006 performance in small businesses. International
Pärkkä, J., et al. (2002). A wireless wellness monitor Journal of Information Management, 26(1), 16–29.
for personal weight management. In Proceedings of doi:10.1016/j.ijinfomgt.2005.10.003
IEEE EMBS International Conference on Informa- Sabogal, J., & Tholke, J. (2004). Compliant
tion Technology Applications on, (pp. 83-88). manufacturing with SAP in the pharmaceutical
Paton, R. A., & Mclaughlin, S. (2008). Services industry. Die Pharmazeutische Industrie, 66(11),
innovation: Knowledge transfer and the supply 1405–1412.
chain. European Management Journal, 26, 77–83. Sambamurthy, V., Bharadwaj, A., & Grover, V.
doi:10.1016/j.emj.2008.01.004 (2003). Shaping agility through digital options:
reconceptualizing the role of information technol-
Perkins, C. E. (2001). Ad hoc networking, Reading,
ogy in contemporary firms. MIS Quarterly, 27(2),
MA: Addison-Wesley.
237–263.
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., &
Schoeneman, J. L., & Sorokowski, D. (1998).
Culler, D. E. (2002). Spins: security protocols for Authenticated tracking and monitoring system
sensor networks. Wireless Networks, 8(5), 521–534. (ATMS) tracking shipments from an Australian
doi:10.1023/A:1016598314198 uranium mine. In Proceedings of the 31st Annual
Radjou, N. (2003). U.S. manufacturers’ supply 1997 International Carnahan Conference on Se-
chain mandate. World Trade, 16(12), 42–46. curity Technology on, (pp. 231-240).
Raines, R. R. (1996). Getting the Message Through: Shih, E., et al. (2001). Physical layer driven protocol
A Branch History of the U.S. Army Signal Corps, and algorithm design for energy-efficient wireless
CMH Pub 30-17. (pp. 224). Washington, DC: Cen- sensor networks. In MobiCom ‘01: Proceedings of
the 7th annual international conference on Mobile
ter of Military History, United States Army.
computing and networking, (pp. 272-287). New
York: ACM.
94
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
Slack, N., Chambers, S., & Johnston, R. (2001). Wang, N., Zhang, N., & Wang, M. (2006). Wireless
Operation Management. Essex, UK: Pearson sensors in agriculture and food industry - Recent
Education Limited. developments and future perspective. Comput-
ers and Electronics in Agriculture, 50(1), 1–14.
Smirnov, A., & Chandra, C. (2001). Information
doi:10.1016/j.compag.2005.09.003
Technologies for Supply Chain Management,
(pp. 437-460) Want, R., Farkas, K. I., & Narayanaswami, C.
(2005). Guest editors’ introduction: Energy har-
Sohraby, K., Minoli, D., & Znati, T. (2007).
vesting and conservation. Pervasive Computing,
Wireless sensor networks: Technology, proto-
IEEE, 4(1), 14–17. doi:10.1109/MPRV.2005.12
cols, and application. New York: John Wiley &
Sons, Inc. Waterman, J., et al. (2005). Demonstration of
SMART (Scalable Medical Alert Response
Studman, C. J. (2001). Computers and electronics
Technology). Proceedings of AMIA 2005 Annual
in postharvest technology – A review. Computers
Symposium, pages 1182-1183.
and Electronics in Agriculture, 30(1-3), 109–124.
doi:10.1016/S0168-1699(00)00160-5 Woo, A., & Culler, D. E. (2001). A transmis-
sion control scheme for media access in sensor
Su, W., et al. (2004). Communication Protocols
networks. In MobiCom ‘01: Proceedings of the
for Sensor Networks. In Raghavendra, C.S., Sival-
7th annual international conference on Mobile
ingam, K., & Znati, T. (Eds.). Wireless Sensor
computing and networking, (pp. 221-235). New
Networks, New York: Kluwer Academic.
York: ACM Press.
Van Ark, B., Broersma, L., & Den Hertog, P.
Wood, A. D., & Stankovic, J. A. (2002). Denial
(2003). Services innovation, performance and
of service in sensor networks. Computer, 35(10),
policy: a review. Retrieved April 30, 2009, from
54–62. doi:10.1109/MC.2002.1039518
http://www.ez.nl/dsresource?objectid=143412&
type=PDF Xu, H., Sharma, S. K., & Hackney, R. (2005).
Web services innovation research: towards a dual-
van Dam, T., & Langendoen, K. (2003). An adap-
core model. International Journal of Information
tive energy-efficient Mac protocol for wireless
Management, 25(4), 321–334. doi:10.1016/j.
sensor networks. In SenSys ‘03: Proceedings of
ijinfomgt.2005.04.004
the 1st international conference on Embedded
networked sensor systems, (pp. 171-180). New Ye, W., Heidemann, J., & Estrin, D. (2001). An
York: ACM Press. energy-efficient MAC protocol for wireless sensor
networks. Proceedings of Twenty-First Annual
Van Riel, A. C. R., Lemmink, J., & Ouwersloot,
Joint Conference of the IEEE Computer and
H. (2004). High-technology service innovation
Communications Societies, 3, 1567-1576.
success: a decision-making perspective. Journal of
Product Innovation Management, 21(5), 348–359. Younis, M., Youssef, M., & Arisha, K. (2002).
doi:10.1111/j.0737-6782.2004.00087.x Energy-aware routing in cluster-based sensor
networks. Proceedings of the 10th IEEE/ACM
Verdone, R., Dardari, D., Mazzini, G., et al. (2008).
International Symposium on Modeling, Analysis
Wireless sensor and actuator networks Technolo-
and Simulation of Computer and Telecommunica-
gies. London: Academic Press.
tions Systems on, (p.129).
95
Impact of Wireless Sensor Network Technology on Service Innovation in Supply Chain Management
Yun, S., Lee, J., Chung, W., Kim, E., & Kim, S.
(2008). A soft computing approach to localization
in wireless sensor networks. Expert Systems with
Applications, 36(4), 7552–7561. doi:10.1016/j.
eswa.2008.09.064
96
97
Chapter 5
Application and Design
of Surface Acoustic Wave
Based Radio Frequency
Identification Tags
Han Tao
Shanghai Jiaotong University, China
Shui Yongan
Institute of Acoustics, China
aBStract
This chapter overviews a complementary technology to the integrated circuit based radio frequency
identification (RFID)—Surface Acoustic Wave (SAW) based RFID. The fundamental principle and
applications of SAW RFID are presented. In order to guarantee the encoding capacity and reliable
reading range, the design criteria in coding scheme, tag design and a time domain interrogated reader
design are discussed in detail. As an example, a low-cost SAW RFID system applied in poultry farming
management is introduced.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
98
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
can replace high-cost battery-powered active 3. SAW tags can identify the objects with high
tags. It is reported by RFSAW Inc. that 100% moving speed.
of all 104 palletized cases with shampoos
inside can be successfully identified by Because a readout procedure requires only
using SAW RFID tags. In addition, SAW a few microseconds, a hundred thousand inter-
tags have also been used to the International rogations can be performed per second, thus
Space Station for asset tracking because of permitting reliable identification of particularly
the above advantages [3]. fast moving objects. In comparison, the standard
2. Because the substrate materials of SAW regulations limit the silicon tag reader to a low
tags are piezoelectric crystal, SAW tags can rate. The SOFIS SAW RFIDs made by Siemens
work from cryogenic temperatures up to were used in Munich’s subway system in the early
several hundred degrees and can withstand 1990s. The maximum velocity of a train passing
high energy x-rays, or gamma ray that will by can be 350km/h [6,7].
make semiconductor devices out of work.
Correspondingly, SAW RFID is ideal for ap- 4. SAW tags are capable of being multifunc-
plications where very low/high temperature tional devices, such as simultaneous identi-
and/or sterilization of the tagged items are fication, sensing and/or real-time location.
required, such as surgical instruments in Surface acoustic waves are sensitive to many
hospital, circulation boxes for supermarkets, different parameters that affect the phase
molten metal containers, and so forth. velocity of acoustic, each of which pos-
sesses a potential sensor response. Currently,
The commonly used material for SAW tags is there are some commercialized wireless and
LiNbO3, which begins to decompose at 300°C. passive SAW sensors, such as temperature
If special package techniques and crystals are sensors, pressure sensors, torque sensors,
utilized, which includes electrode materials of humidity sensors, vibration sensors and so
IDT (such as Au, Pt, W, Mo and et al.), adhesives, forth[7,8]. With the legislation in logistics
boding wires, housing material of packaging, and operations, there is a key requirement of
substrate of antenna, the operating temperature RFID tags with integrated sensors (e.g. tem-
range can be extended to a higher temperature. perature, humidity, acceleration or shock)
Available but limit supplied crystal substrates for recording how the transported items in
such as La3Ga5SiO14 and GaPO4 are known to applications, such as pharmaceuticals, hos-
be high temperature resistive up to 1000°C. Some pital transfusions, clinical trials, foods are
of them have been used successfully in wireless treated. Another promising application for
SAW sensor systems for high temperature ap- SAW sensing RFID is the intelligent tyres
plications [4]. system, which need identify the tyres for
SAW tags from AirGATE Technologies Inc. anti-counterfeiting and measure the pressure,
have been used for monitoring drill pipe and other temperature insides the tyres and the friction
down hole tool in the oil and gas fields because in driving processing[7,8]. All the functions
they have been developed and packaged specifi- can be implemented by SAW devices.
cally to withstand temperatures up to 300°C and
pressures up to 20,000 psi with a large reading Moreover, evaluation of a SAW tag response
range [5]. incorporates precise time delay measurements
leading to an accurate distance determination of
tags relative to the reader. Therefore, SAW systems
99
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
offer significant benefits for two-dimensional cost and tag losses. For the code division
localization systems. Other systems can typically multiple access (CDMA) applied in SAW
only determine the tag’s location within a 10-foot RFID, it suffers from the near/far effect and
radius, SAW technology enables it to be identified the coding capacity [12].
within 2 feet of its exact location [9,10]. These
more precise location identification features are
now enabling SAW tags use in wireless sensor However, numerous recent efforts have demon-
network. strated the feasibility of anticollision capability
of SAW RFID, especially in the cases that not a
drawbacks of SaW rfId high volume of ID is required[13-16]. It may be
implemented by compound approaches. RFSAW
1. SAW RFID is read-only. The encoding of presents its anti-collision method, which includes:
SAW RFID is dependent on the positions and a hierarchical interrogation, signal strength dis-
number of reflectors, which is predetermined crimination, time division or time separation,
in the photolithography processing of a tag. spatial discrimination based on selective antenna
This limits its applications. patterns to limit the physical region being inter-
2. Code capacity of SAW RFID is restricted by rogated, code division separation and matching
the dimension of the substrate. Some com- correlation[15]. However, the directional anten-
mercialized SAW RFID systems at 2.45GHz nas is suitable for 2.4 GHz or higher frequencies
have 32-bit of code capacity [6,7,11]. In order tags, as highly directional antennas at 900 MHz
to be compatible with EPC-96 and EPC-128 are quite large and unlikely to be practical for
RFID specifications, it is an important task indoor use.
in SAW RFID research and development
to implement an encoding scheme within
limited substrate area. SyStem deSIgn of SaW rfId
3. There has been no completed anti-collision
solution yet. Since the responses of SAW Although many considerations in reader and
tags are not orthogonal and individual tags antenna design can be shared by SAW and other
can not be switched on and off, according to types of RFID, there are some exclusive require-
the reader’s instruction, neither the ALOHA ments in system design of SAW RFID, including
method in ISO15693 nor the Binary-Tree the coding scheme, tag design as well as reader
Search algorithm in ISO18000 standards is design. The specification in a practical SAW RFID
suitable for SAW-RFID directly. A method system include: encoding capacity, reliable reading
for enhancing the orthogonality of the range, anti-collision, tag size, antenna gain and
SAW tag response signal would be helpful. polarization, useable temperature range, as well as
However, a single multiple access technique the price. One has to implement a tradeoff among
in modern communication technology still various applications, the governmental mandated
can not resolve the anti-collision com- emission requirements and the cost.
pletely. For example, the time separation
has restricted use in practical applications reading range
because the number of non-overlapping
time segments is rather limited and such The reading range is probably the most obvious
tags require SAW devices that have longer characteristics of RFID, and of most interest to the
delay times. This leads to devices with extra system user. However, it is also the most difficult
100
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
Table 1.
101
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
Figure 3. Principle of pulse position modulation Figure 4. Principle of phase shift keying modu-
lation
102
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
Figure 5. Schematics of multiple pulse position modulation combined with phase offset (source from:
RF SAW, Inc)
number of empty slots between pulses is 12. The compatible with EPC requirement. However, it
reference pulse is used for data synchronization, puts high demands on tags design of locating the
phase reference and temperature compensation. reflectors exactly with the desired phase in design.
In Table.2, we list the comparison results of And all disturbing factors which change the delay
the above coding schemes of SAW RFID. Here, of a bit, e.g., variations in the SAW velocity and
MPSK stands for M-ary phase modulation. When the accuracy of the fabrication process, must
M=2, it is equivalent to BPSK modulation as be controlled within a small fraction of a SAW
shown in Figure 4. In case of TOPPS, we suppose wavelength to meet the requirement of high phase
the number of data group is m; the number of time accuracy[7]. According to the authors’ experi-
slot in a group is i; and the number of pulse in ence, some design criterion will be discussed in
a group is n. k is the minimum number of slots the following part.
between two pulses.
And the minimum time span of a data group tags design
t
m in Eq.4 can further be reduced by increasing
k According to the given specifications and the
the time delay resolution. One of good solutions chosen coding scheme, the positions and num-
is a time overlapped pulse position modulation ber of reflectors in line and their reflectivity are
combined with phase offset, which distinguishes determined in design. There are some principles
two adjacent pulses by their phases of the carrier should be obeyed in this process.
wave within the pulse. For example, when i=75,
k=12 and n=4, six data groups will be compatible 1. According to Eq.(1), reducing the tags
with EPC-96 RFID specifications. Some redun- insertion loss to the minimum is important
dant codes can be used for anti-collision and error for reliable read range capability. The main
checking. However, the required signal-to-noise loss mechanism in SAW tags includes[19]:
ratio SNR mentioned in Eq.1 has to be higher the bidirectional losses of IDT, the channel
than those of the OOK and the common PPM mismatch losses, the impedance mismatch-
coding scheme. ing losses between IDT and the antenna, the
In summary, the efficiency of scheme with reflection losses, SAW propagation attenu-
phase information can be high enough and be ation as well as the bulk wave scattering
103
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
produced when the incident Rayleigh waves where E0 is the incident energy. It can be seen
pass through a reflector, and resistivity of that the amplitude of reflective echoes gradually
the busbar and electrodes in transducers. decrease along with the order of the echoes. In
In order to reduce the 6dB of bidirectional order to get uniform reflective echoes, on has
losses of IDT, a single phase unidirectional to increase the reflectivity of each reflector by
transducer is usually used, even at 2.45GHz varying its metallization ration and period to
[20]. In order to match with the antenna and compensate the propagation and bulk wave scat-
to have not too small aperture (to avoid the tering losses. The reading range depends upon the
diffraction effect), a few of identical trans- minimum amplitude of the reflective pulse. The
ducers may be connected in series for the uniformity of pulse amplitudes in fact means the
electrical ports and in parallel for acousti- increase of the reading range. On the other hand,
cal ports[21]. The channel mismatch losses the multi-reflection is inevitable and the uniform
and reflectivity losses can be reduced to the amplitudes means the multi-reflection effect is
minimum by arranging all the reflectors in reduced to the minimum.
line with reflectivity as high as possible. Many reflector configurations (open-circuit,
However, number of reflectors and the short-circuit, interdigital transducer, positive-
maximum reflectivity are limited by the negative electrodes reflectors, et al) can be used
multi-reflection between reflectors. to obtain a given value of reflectivity, as illustrated
2. Suppose that N of reflectors are arranged in in Figure 6. The best choice is to use a structure
line. The reflection coefficient and transmis- with minimum scattering losses. However, the
sion coefficient are Pi and Ti (i=1,2,…,N), phenomenological models, such as the coupling
respectively. Because of the bulk wave scat- of modes (COM), are not suitable for modeling
tering produced when the incident Rayleigh and analysis of the above reflectors with few elec-
waves pass through a reflector, Pi 2 + Ti 2 < 1 trodes. A more accurate and fast method, called
. Neglecting the propagation losses, the source regeneration method[22] is proposed based
reflected energy from the ith reflector is on Green’s function combined with finite element
analysis to obtain the reflection, transmission and
æ i-1 ö scattering of reflector with a few electrodes, which
Ei = E0 × Pi 2 çççÕ Tm4 ÷÷÷ (Eq.6) are the basic knowledge for a good SAW tags
çè m=1 ÷ø
design. In the tags with relative bandwidth over
1%, the open circuit reflector on 128°YXLiNbO3
104
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
substrate is usually chosen [23] because of less carrier wave of reflective echo, in addition
scattering losses and electrode resistivity losses to a proper location of the envelop of the
than short-circuit reflector. In case of uniform wave pulse [24]. To achieve this, one has
amplitude compensation of reflective pulses, to know not only the reflection phase and
the reflectivity of last reflector is not too high. It transmission phase of all the reflectors so as
helps to obtain more reflectors inline under the to compensate the phase changes when the
limitation of multi-reflection effect. In Figure 7, wave propagates through the reflector and/
the measured frequency-domain(Tr3) and time or reflected by the reflector. A good design
response (Tr2) of a SAW RFID using Agilent also needs to know the phase accuracy
E5070B vector network analyzer are presented. in the system, including the case that the
It can be seen that fast oscillations occur in the temperature is different from the designing
frequency-domain response. They are contribu- one. Without the information of phase errors,
tions of the ten reflected echoes and the multi- one has to design his encoding scheme with
reflection among reflectors. Additionally, Due much fewer code capacity for the sake of
to the increasing reflectivity of each reflector to reliability[21].
compensate for the energy losses, the amplitude
uniformity of pulse is within a range of ±1dB
according to the Tr2. reader design
3. If the tags with phase modulation are There are the air interface standards, ISO18000
designed, the reflector must be appropri- series, for UHF IC based RFID readers, where
ately located to obtain the defined phase in signals are defined without reference to either
Figure 7. The measured frequency and time responses of a SAW tag. Tr2 is the logarithmic magnitude
of the time response with 1dB/grid. Tr3 is the frequency response from 885MHz to 945MHz
105
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
the interrogation or response devices. These air total system bandwidth at once is interrogated,
interfaces are logical if both such devices are ac- then the reflected signals from tags are the impulse
tive. However, they inefficiently over-specify the response functions. This reader architecture is suit-
essential requirements being used for SAW RFID able for identifying the fast moving objects[7,25].
readers because SAW tags are passive and only In addition, the interrogation signal could also be
respond to signal stimulus. Identifying SAW RFID an amplitude weighted burst to shape the signal
tags can be done through the theories in fields of in frequency domain and to keep the allowed
pattern recognition and system identification. The bandwidth.
commonly used method is calculating the impulse A sufficient isolation between transmitter and
response functions of tags. Variety of approaches receiver (Tx/Rx) is additionally critical because the
in designing SAW tag readers to obtain the impulse direct coupling of the transmit signal to the receive
response functions are permitted because there path leads to DC signal at the output of quadrature
is no limitation on type of interrogation signal demodulation and hence a reduced dynamic range.
apart from the governmental mandated emission The isolation of the antenna switch is superior to
requirements. The reader architectures operated a circulator because of the non-continuous wave
in time domain or in frequency domain are shown mode. It is also feasible that the power amplifier can
in Figure 8(a) and Figure 8(b), respectively. be disabled during the receiver begins to work.
In a time domain reader, a tone burst pulse The minimum signal power applied to the
simulating the Dirac signalδ(t), which covers the reader input that gives the required output signal
Figure 8. SAW RFID transceiver architectures operated in time domain or in frequency domain
106
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
107
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
Q
q r = arctan (Eq.11)
I
Figure 9. Coherent demodulation outputs, inphase I (Channel 1) and quadrature Q (Channel 2) signals
for a pulse position modulation tag measured by TDS3052 oscilloscope
108
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
concluSIon
The SAW RFID reader can also be operated in
frequency domain[27-29]. One reader architecture SAW RFID provides some solutions to identify in
is presented in Figure 8(b). Another one proposed harsh environments or where long read ranges are
by Stelzer et al is similar to the dechirping scheme required. And it can be fairly complementary to IC
in high resolution range radar[26]. As shown in RFID in different applications. A coding scheme
Figure 8(b), the interrogation signal can be either with high efficiency, especially utilizing the car-
the stepped frequency signals or the frequency- rier phase of each pulse in the impulse response
modulated continuous waves (chirp signal) gener- of tags can greatly improve coding capacity of
ated by the local oscillator(LO1). If the stepped SAW RFID. The design criterion for tags and
frequency signals is used, the frequency response reader are discussed.
can be achieved by multi-scanning and recording
Figure 11. Application of SAW RFID in poultry farming management (a) and the antenna of SAW RFID
(b)
109
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
110
Application and Design of Surface Acoustic Wave Based Radio Frequency Identification Tags
Hartmann, C. S., & Claiborne, L. T. (March 26- Scholl, G. (2003). SAW-based radio sensor
28). Fundamental Limitations on Reading Range systems for short-range applications . IEEE Mi-
of Passive IC-Based RFID and SAW-Based RFID, crowave Magazine, 4(4), 68–76. doi:10.1109/
2007. In Proceedings of IEEE International Con- MMW.2003.1266068
ference on RFID, (pp.41 – 48).
Stelzer, A. (2004). Identification of SAW ID-Tags
Kuypers, J. H., Reindl, L. M., Tanaka, S., & Es- Using an FSCW Interrogation Unit and Model-
ashi, M. (2008). Maximum Accuracy Evaluation Based Evaluation. IEEE Trans. UFFC, 51(11),
Scheme for Wireless SAW Delay-Lin Sensors . 1412–142.
IEEE Transactions on Ultrasonics Perforlctrics,
Stelzer, A., Schuster, S., & Scheiblhofer, S. (2004).
and Frequency Control, 55(7), 1640–1651.
Readout Unit for Wireless SAW Sensors and ID-
doi:10.1109/TUFFC.2008.840
Tags, in 2nd International Symposium on Acoustic
Lehtonen, S., & Plessky, V. (2000). Unidirectional Wave Devices for Future Mobile Communications
SAW Transducer for Gigahertz Frequencies. IEEE (pp. 37–44), Chiba, Japan.
Trans. UFFC, 50(11), 1404–1406.
Wang, W. B., Han, T., Zhang, X. D., Wu, H. D.,
Li, Q., Ji., X., Shi, W. & Han.- T. (2009). Walsh & Shui, Y. A. (2007). Rayleigh wave reflection
Matched-Threshold Filtering in SAW Tag Ap- and scattering calculation by source regenera-
plications to Provide Multiple-Access Capability tion method. IEEE Transactions on Ultrasonics,
. Journal of Shanghai Jiaotong University, 14(6), Ferroelectrics, and Frequency Control, 54(7),
681–685. doi:10.1007/s12204-009-0681-3 1445–1453. doi:10.1109/TUFFC.2007.405
Ostermayer, G., Pohl, A., Hausleitner, C., Reindl, White, R. M., & Voltmer, F. W. (1965). (n.d.).
L., & Seifert, F. (1996). CDMA for wireless “Direct piezoelectric coupling to surface elastic
SAW sensor applications. In Proc. IEEE Int. waves . Applied Physics Letters, 7, 314–316.
Spread-Spectrum Tech. Applicat. Symp., (pp. doi:10.1063/1.1754276
795–799).
X-Change Corporation Delivers Surface Acous-
Pohl, A. (2000). Review of wireless SAW sensors. tic Wave (SAW) Tag Technology for the Oil
IEEE Trans. UFFC, 47(2), 317–332. and Gas Industry. Retrieved from http://www.
thefreelibrary.com/X-Change+Corporation+Del
Retrieved from http://www.baumer.se/rfid.
ivers+Surface+Acoustic+ Wave+(SAW)+Tag...
htm#OIS-W
-a0176649458
111
Section 3
Logistics Informatics and
Information Logistics
113
Chapter 6
Information Needs of
Logistics Service Providers
Ulla Tapaninen
Merikotka Research Center, Finland
Hennariina Pulli
Merikotka Research Center, Finland
Antti Posti
Merikotka Research Center, Finland
aBStract
This chapter explores supply chains, all the way from the manufacturing point to the customer site.
The concentration is on logistics service providers (LSPs). In terms of overall quality, the information
infrastructure in Finland has constantly ranked among top 10 positions in international comparisons
regarding information society development (e.g. WEF 2008). The purpose of the chapter is to point out
the current level of information sharing in supply chains focusing on the information needs of logistics
companies, particularly from the LSP’s point of view. A study conducted by the University of Turku re-
vealed that there is a lack of logistics information in the supply chain (Pulli & al. 2008). The information
distribution should be intensified when aiming at achieving a more efficient supply chain.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Information Needs of Logistics Service Providers
tion more easily. As an example, Internet can be need to cope with several standards, which in-
utilized to serve the needs of an integrated supply creases their operational complexity (Kekäläinen
chain. Through Internet the actors of a supply 2006). Another challenge can be the culture change
chain can interact with each others, for example that is required to gain open information sharing
by sharing information of their stock levels. In in the supply chain. The benefits of transparency
order to quickly respond to the customer’s needs, should be made clear to the actors of supply
it is necessary for the companies in the chain to chains. That should encourage them, when trying
collaborate and integrate as a whole (Zhang et al. to overcome the difficulties that can emerge when
2006). Naturally, the integration can not necessar- reaching a transparent supply chain.
ily be achieved with every member of the chain.
The objective of this chapter is to point out the
information elements the LSPs need to share to ImPortance of InformatIon
reach an efficient supply chain. In SuPPly chaIn management
114
Information Needs of Logistics Service Providers
information that could affect the forecasts. Rapid able production capacity, and so on. Third, some
reaction to possible changes in a supply chain models use actual historical data to calibrate model
requires rapid sharing of information. That in accuracy. This means that model outputs can be
turn requires proper information channels. Well- compared to what actually happened to ensure the
organized sharing of information can also reduce model is valid (Ratliff & Nulty 1997).
the need for warehousing (Singh 1996).
When actors of a supply chain want to achieve Supply chain Integration
more efficient supply chain, the key is optimiza-
tion of the entire chain. This refers to the fact that The main principle behind the concept of supply
supply chains should be considered as a whole chain management is to integrate all the activities
and also treated as a whole. It is not very rational in a chain into a well-functioning entity. It is not
to only optimize a single process of a chain, but reasonable to separately optimize the different
rather the whole chain. This is not a very simple activities. The various functions and groups in
task, so managing one order from its starting point organizations work for goals that are set together.
to the delivery point can be considered as a great The goals can be, for example, to reduce produc-
challenge in supply chains. It is common that tion costs, to improve the quality of products /
the supplier controls the information about the services or to develop new products / services.
production and quality of the products and also Working for goals set together can be described
information about when the products are leaving as integration. SCM is primarily concerned with
the production plant. Transport companies know managing relationships with supplier and custom-
the products they are carrying and also where ers in order to deliver the best possible customer
these products are located. Supply chains consist value at the lowest cost. SCM emphasizes effective
of many different actors working together, which and efficient flows of both information and also
may lead to situations that are difficult to handle. physical items to meet customer requirements,
Especially when some changes, like, for example, starting from the source of raw materials to the
damages and weather conditions occur; it can result consumption of the product. Also recycling of the
to huge extra manual work (Laaksonen et al. 2004). consumed goods is part of supply chain manage-
If information is handled more automatically, and ment. The management of these processes requires
actors of a chain know where certain products close collaboration among the different parties in
are and where they are needed, it is possible that the supply chain, including raw material suppliers,
products can move ideally Just-In-Time (JIT) and manufacturers, distributors and retailers. IT can
the need for warehousing is at its smallest. The able real-time integration of supply chain actors,
reaching of a situation where transported products by making it possible to share large amounts of
can be precisely traced requires integration of information along the supply chain (Li et al. 2009).
logistics processes of different actors and tracing Integration of supply chain is considered to be
of products with advanced IT systems. of strategic as well as operational importance. It
Information can be generated in three ways: has been claimed that supply chain integration
current information, forecasts and historical in- impacts first on chain performance, which, in turn,
formation. First, some logistics models are based impacts on overall performance (Fabbe-Costes
on current information. As an example, vehicle & Jahre 2008).
dispatching models need information about to- A common challenge that many organizations
day’s orders, vehicles available and driver status. face is the fact that the time it takes to acquire the
Other models are based on forecasts. Historical raw material, to manufacture the products and
data is then used to predict future demand, avail- to deliver the products for customers, is usually
115
Information Needs of Logistics Service Providers
longer than the customer desires (Christopher use of it. It is essential for a company’s employees
1992). Traditionally, the solution for this problem to know when and what kind of information to
has been forecasting the consumption and thereby use (Singh 1996).
keeping stock. Forecasting is often thought to be
the case of manufacturing companies, but also Supply chain transparency
other branches have to plan their activities for a
long time ahead into the future. Because customer Often the only piece of information that a com-
demand is not often perfectly stable, logistics pany receives concerning the market demand is
companies must forecast demand to be able to the actual customer orders. Christopher (1992)
reserve enough resources. Forecasts are based on describes this as the tip of an iceberg. If the supplier
statistics, and they are rarely perfectly accurate. could see “underneath the surface”, for example,
Because of this uncertainty, companies often create receive real-time information about the actual-
additional stocks that can be called as inventory ized consumption, the supplier could have more
buffers. When moving up the supply chain from time and knowledge to prepare to the customers’
end-customer to the suppliers, each actor in the needs and the activities could be more effectively
supply chain has greater observed variation in timetabled. In other words, the company would
demand and thus greater need for safety stock. The have more time to plan what to do and when.
variations are amplified as one moves upstream If the supplier has no information on the future
in the supply chain. This is often called the Bull- material flow, stock levels and demand, it usually
whip effect. Errors easily occur if the companies has to compensate the uncertainty with stocks. For
in the supply chain do not co-operate and share logistics companies the compensation could for
essential information needed for forecasts. Mak- example mean reservation of extra containers or
ing of forecasts that are satisfyingly accurate is vehicles. Naturally, this brings some extra costs
rather difficult if the actors of a certain chain do for the companies.
not achieve long-term collaboration (Lysons & Transparency of a supply chain refers to the
Farrington 2006). fact that partners of a chain are able to track the
As stated above, an integrated supply chain delivery (location of products, deviations in de-
can be the answer for lead-time gap, forecast livery timetables etc.) and costs of the transport.
inaccuracy and transparency of the chain. The With a full view of the chain, it is possible for
basic idea behind the concept of integration is that all partners to gather and receive the informa-
the performance level of a company or a supply tion concerning the deliveries and products.
chain can be improved through the better sharing This information should be easily reached and
of information and through the planning of the employed. When the supply chain is transparent,
activities and their interfaces together. Through the it is easier to manage it: to direct, plan and track
co-operation between the supply chain partners, the deliveries in every phase of the chain. With
it is possible to optimize the performance level better management, it is possible to speed up the
of the entire chain and to satisfy the customers’ deliveries. If the supply chain has become more
needs better than before. It is easier to meet the transparent, it is also possible to manage appear-
needs of the customers and to reach overall cus- ing deviations better than before. Transparency
tomer satisfaction if the movement of the goods allows the actors of the chain to see the possible
and related information is well-managed. The bottlenecks and thus remove them. One major
information shared in the supply chain has to be challenge for transparency is globalization and
accurate, right-time and transparent. Information the continually accelerating pace of world trade.
itself is not the answer but rather the right kind of It offers more possibilities and new markets for
116
Information Needs of Logistics Service Providers
companies, but can also create complexity in the a chain understand the importance of each piece
information sharing and visibility (Mäkinen et of information in the chain.
al. 2005).
There are some preconditions for the gaining real-time or right-time Information
of a transparent supply chain. It requires that
actors of a chain freely share information with Information in a supply chain can be shared
each others. This is essential if the actors want to real-time or right-time, for example. Real-time
meet their customers’ needs in time. To achieve information can be utilized without delays, but
this open information sharing, actors of a chain right-time information is available when it is most
should have reliable enough relationships with useful. Real-time information makes it possible to
each other. And the achieving of trust requires react quickly, especially when some changes occur.
some level of transparency (Kauniskangas 2007). Immediately received information concerning, for
All this leads to the fact that companies should example, ETA (Estimated Time of Arrival) that
have close and reliable enough relationships with has changed, gives a company the opportunity
their suppliers and customers. Well-functioning to reorganize its resources. However, real-time
collaboration enables companies to integrate their information is not always necessary. It should be
activities (Spekman et al. 1998). Integration in turn considered in every process whether it would be
forces companies to consider their processes and reasonable to use information with a short delay.
to minimise possible bottlenecks. In this case, it is a question of right-time informa-
Even if a company recognises the importance tion. In some cases, real-time information can even
of right-time information, it is not self-evident that decrease flexibility in a dynamic environment.
the company automatically makes its processes Also generating real-time information may cause
more effective and transparent and starts to share great costs, for example, as a result of system
more information with its partners. There have to integration. Right-time information also brings
happen changes in the culture of the management challenges for information systems. The most
level before a company begins to distribute more important issue is to find the processes in which
information more openly than before. Traditionally real-time information is truly useful. The survey,
companies have shared information mainly inside which consisted of six cases (Kone, Nokia, Metso
their own departments. Sometimes companies do Automation, Fujitsu Invia, ABB and Outokumpu),
not necessarily see the possible advantages that revealed that real-time information is not always
could be achieved through better sharing of infor- a prerequisite for business. Real-time information
mation. For example, one fear is that competitors is most useful in the situations in which a quick
gain delicate data and exploit it on the markets. reaction to the emerged deviations is required
In some cases it can even be the technology used (Salmela & Jahnukainen 2003).
that restrains the achievement of transparency.
For example with an ERP (Enterprise Resource
Planning) system it may be difficult to reach a 3 logIStIcS and It
complete view over the chain, because these rather
old systems do not necessarily offer information Information technology is one of the key factors
in such forms that could be utilized in effective in integrated supply chains. It is not even possible
ways (Salmela et al. 2006). If a company cannot to implement or control integrated chains without
see the advantages of the sharing of information, it information technology. The efficient use of IT
is not very highly motivated to share information. in a supply chain requires sharing of informa-
Thus, the goal should be to make all the actors of tion between different operations. Technology,
117
Information Needs of Logistics Service Providers
infrastructure and information are combined in and storages. Real-time communication is based
information technology. All these three fields on wireless connections between these different
should be managed properly so the benefits of spots. The versatility of technologies brings its own
information technology can be maximized (Gopal challenges to logistics (Laaksonen et al. 2004).
& Cypress 1993). One word to describe logistics as a business is
diversity. Logistics is not dependent on just one
Information Systems in logistics branch of industry or business but consists of
many different businesses and actors. This is the
Information systems that are utilized in the main reason why logistics actors cannot focus
controlling of supply chains can be divided, for on just one standard. Logistics service providers
example, to a) internal systems operating inside must cope with many different standards which
the company and b) external systems operating can really complicate their processes (Kekäläinen
between different companies. A system based on 2006). A company has to do business with many
open information helps to share information both other actors and this also brings along many dif-
inside the company and outside the company. ferent interfaces. This is probably the situation
Such an open model can include, for example, the also in future because it is not very probable to
key suppliers, manufacturers and end customers reach a situation of just one standard.
of the company. The sharing of information can ERP (Enterprise Resource Planning) systems
be based on different kinds of database systems are worth noticing in the field of logistics. They
or data warehouses located in various locations can have a great impact on the intensification of
or companies. When sharing information in the activities in a company. With ERP systems, it is
chain between different actors, the actors have possible to reach better quality of information and
the possibility to improve the marketing time of for example utilize real-time information. They
their products and to cut costs. In general, better also help to intensify the activities in a company
access to information helps actors to allocate their and diminish the lead time of products. The basic
resources for the future. SCM systems include, version of the ERP system has been developed
for example, warehouse management systems, to serve the needs of a manufacturing company.
which provide real-time information on the mate- With this in mind, it is easy to understand that
rial flows of the warehouse and the movements standardized ERP systems do not necessarily fit
of the products. With this information storage into the processes of logistics companies. Stan-
space, labor and the use of tools and vehicles can dardized software does not usually well support
be optimized (Helo & Szekely 2005). some new SCM models, like VMI (Vendor Man-
Development of IT has had and will have aged Inventory) or utilization of sales forecasts.
a significant role in logistics and supply chain Elcoteq Inc. has solved this challenge so that it
management. IT enables for example real-time uses many separate standardized software pack-
information and transparency. These two concepts ages to manage its processes, and has executed
bring more efficiency to logistics management the integration of these systems by itself. Outside
(Punakivi et al. 2001). Telecommunications will Elcoteq it looks like these different systems are just
be more continuous and multilevel in future. The one entity (Kauremaa & Auramo 2004). The basic
different levels can be actors, locations, means idea behind VMI is managing inventory by the
of transport, containers/cases and consumer vendor on the behalf of the buyer. By doing this,
packages. The amount of data will grow because the customer can focus on its core business.
more and more information and communication In addition to ERP, also EDI (Electronic Data
will be handled automatically between vehicles Interchange) is a commonly used technique in
118
Information Needs of Logistics Service Providers
logistics companies. EDI stands for standardized of XML, it possesses more standards than EDI
automated transmission of data between two in- (Kauremaa & Auramo 2004). The main difference
formation systems. As an example of the use of with these two is that EDI is designed to serve the
EDI is transmission of different documents, such needs of business, and is a process, when XML is
as orders, invoices and customs documents. With a language (Lysons & Farrington 2006).
EDI these are automatically transmitted from Different kinds of web-based solutions can be
the sender company’s IT system to the receiving considered as modern technologies in logistics.
company’s information system. The using of EDI The great benefit of web-based solutions is that
is very reasonable when there are large flows of a company does not need to build heavy point-
goods and the company’s partners are being settled to-point connections when using web-based
on. The building of EDI connections is expensive solutions. Companies can, for example, begin to
and there has to be quite a large amount of trans- receive their orders through Internet or extranet.
actions for the system to pay itself back. These Kauremaa & Auramo’s (2004) research concern-
facts make it unprofitable for SMEs (small and ing advanced Finnish logistics companies revealed
medium sized companies) to use EDI (Kauremaa that the focal features of web-based solutions are
& Auramo 2004). the receiving of orders and the sharing of informa-
The versatility of standards can also be con- tion about the state of deliveries to customers. One
sidered as a downside of EDI. It is possible that benefit in the handling of orders through the web
a company is forced to use different kinds of EDI is that customers have to obtain all information
messages with different customers because of the (in comprehensive format) related to the ordered
customers’ demands. Some logistics companies products before the order is accomplished. Oth-
have begun to use the open standard XML (Ex- erwise the order is not accepted in the system. By
tensible Markup Language) aside EDI. XML is an using the web, a phone call related to the order
extensible language, because the user can define is not required; at the same time a company can
the mark-up elements. The purpose of XML is to avoid making later additional questions, because
help information systems share structured data, the customer has to provide more comprehensive
especially through Internet, to encode documents, information than in the telephone order. Making
and to serialize data. XML makes it possible to orders through the web may be beneficial also to the
define the content of documents separately from customer, because he does not need to queue on the
the formatting, which makes it easy to reuse that phone. Also tracking services are often provided
content in other applications. The most important on the web (Kauremaa & Auramo 2004).
note is that XML provides a basic syntax that can Kauremaa & Auramo (2004) noticed that only
be used to share information between different 19% of advanced manufacturing and trade compa-
kinds of applications and different organizations nies in Finland use these modern tracking services
without needing to pass through many layers of within their purchases. Among sales about a third
conversion. It has been forecasted that the use of (31%) of these companies uses tracking services.
XML will rise beside of EDI, thanks to the flex- It was stated that companies are not very interested
ibility of it. One benefit of XML, when comparing in the following of the location and condition of
it to EDI, is that it does not take so great invest- their deliveries but are interested if some changes
ments to build the connections between different occur. The most essential part of tracking services
actors. Most of the companies today have connec- in the moment is in-vehicle terminals. Quite a lot
tion to the internet, and it can be used as a base of emphasis is being put on them by IT companies
for XML related data transmission. On the other that are developing techniques related to these
hand, besides the flexibility and profitableness terminals. The in-vehicle terminals provide the
119
Information Needs of Logistics Service Providers
opportunity to have a better view of the transac- two systems that can be considered to be the most
tions that occur during transportation. When a suitable for tracking the location of transported
driver acknowledges the status of a delivery at goods: RFID (Radio Frequency Identification)
predefined points, the haulage organizer knows and GPS (Global Positioning System).
where any certain vehicle is, and is able to plan When there is a need to follow delivered
the schedule for the next transportation tasks. One products world-wide, every tracked product
notable asset of these in-vehicle systems is that should have a tag (e.g. bar code) that globally
they offer information both for the company‘s own individualizes it. This is not a very simple task to
operation planning, and also provide the customers manage, since there are several parallel identifi-
with the same tracking information (Kauremaa & cation systems and some of them provide global
Auramo 2004). Often tracking services are pro- individualization and some do not (Främling
vided on the web, which is easier for the customer 2002). RFID (Radio Frequency Identification)
because he can check the status and location of has come to the markets to “compete” with bar
the delivery at any time. At the same time, the code. Radio identification systems that use short-
logistics company’s customer service saves time range radio technique are a rapidly growing area
as the number of enquiries decreases. of interest. The system consists of a) RFID tags
that are identified with their unique serial num-
Product tracking and tracing ber or with some other certain data, and of b)
one or more RFID readers. The whole system is
The exact location of transported products is not controlled by RFID IT-system and the company’s
necessarily essential information for companies. other IT-systems. Within RFID systems, many
Instead of precise location data, a company is different radio technical solutions and different
often interested to know the points the delivery frequency ranges can be used. RFID technology
is situated between. This information can be does not provide real-time data but rather status
provided if the carrier of the delivery acknowl- information. The information is created every time
edges the predefined points with certain status the tag is read and then the status of the delivery
information. The management of product tracking is updated. The very first RFID tags were made
is usually well controlled as long as the delivery for to mark domestic animals. Today RFID can
is handled with just one logistics company. Then be used at many different lines of business, such
the tracking information can be found in just one as trade, manufacturing, logistics and health care,
information system and is quite easily reachable. to enhance efficiency. RFID can also be used to
As the networking between companies increases protect product safety and to fight against coun-
and supply chains become more global, there terfeiting (e.g. medicines) (Talvela 2006).
is an increasing amount of companies in one An enquiry conducted by VTT Technical Re-
chain. Nowadays, supply chains should be called search Centre of Finland showed that company
networks rather than chains. This is because the representatives believe that RFID related applica-
bunch of activities a delivery requires, reminds tions will be widely used by the year 2015. It is
more a net than a chain, thanks to the concept expected that with RFID, it is possible to bring
of outsourcing, which leads to the diversity of more efficiency to logistics. The most important
logistics companies in a chain. Great challenges benefits of RFID concern tracking of products
can occur when the companies of a supply chain and transport means, and also the transparency
are trying to communicate with each others. of the supply chain. One successful introduc-
Integration of IT systems is not a simple task to tion of RFID technology was at ABB’s factory
perform (Främling 2002). This chapter presents at Helsinki. There the packages of raw material
120
Information Needs of Logistics Service Providers
are identified with UHF (Ultra High Frequency) accuracy of GPS ranges from few metres to tens
RFID. This was the first solution of this kind in of metres. With different extensions of GPS it
Finland (Rytsy 2007). is possible to achieve accuracy of less than one
Although the technique for RFID has been meter. There are also other satellite navigation
ready for use for a few years now, there are some systems (GLONASS, Galileo and Beidou) but
factors that decelerate the adopting of it. One of GPS is the most common and is the only system
the possible hindrances is the relatively high price that operates fully. Satellite navigation systems
of the RFID system. On the other hand, when a has been utilized, for example, in map-making,
large amount of companies begin to use RFID, the land surveying, commerce, scientific uses and
price will come down. Not very many companies tracking. In logistics, it is possible to track vehicles
use RFID, and it is possible that other companies and transportation units with GPS in real-time
are still waiting to see if the use of RFID will in- (Airos et al. 2007).
crease. In innovation adoption, there are always
pioneers that quickly adopt the innovation, and
followers that monitor the innovation diffusion InformatIon needS of
before they have the courage to adopt it too. One caPacIty PlannIng of
of the challenges of RFID systems concerns the logIStIcS comPanIeS
tags. The selection of tags is wide, so finding the
right kind of tag can take some time and effort. Traditionally, production planning has been seen
It also requires resources to find the right spot as a matter of manufacturing companies. But just
in the product where the tag can be attached. like manufacturers, also logistics companies have
For example, if the tag is inside a paper roll, the to plan the use of their resources, for example to
antenna cannot read it, because there are 1.5 me- reserve enough labour or transport capacity for
tres of paper between the tag and the antenna. If each day. The companies in a supply chain need
the tag is attached on the top of the roll, the tag information about forecasts, changes, ETA, the
can break (Siltala 2007). Also metal and differ- location of products and the condition of product
ent fluids can be challenging product groups for and so on. Ratliff & Nulty (1997) have defined
RFID (Rytsy 2007). the information that companies in a supply chain
The Global Positioning System (GPS) can require. Figure 1 presents their view. One can
be utilized, when the supply chain actors desire see that this definition lacks the transportation
real-time data about the location of the transported companies’ site.
goods. GPS is a global navigation satellite system The previous figure illustrated, on a fairly rough
that is developed by the United States Department level, information that companies are exchanging
of Defence. It operates globally and is available with each another. In this report, however, the
24 hours a day. With GPS the user can determine emphasis is on the capacity planning side. The
his location and velocity and also the current time. chapter 4.1 presents the information elements
GPS became fully operational on 1995 and it has that companies in a typical supply chain need
become a widely used aid to navigation worldwide. for their operations. Basic transportations consist
A GPS receiver calculates its position by timing at least of the loading of goods in the transport
the signals sent by four or more GPS satellites. unit, the transportation of goods to the destination
GPS has proved to be reliable and accurate navi- and the unloading of goods at the destination.
gation system. The navigation accuracy of GPS The transportation process also includes various
is depended on conditions of environment and planning, procurement and other preparation and
on the technique of the GPS system. The typical ancillary activities, which can have a notable part
121
Information Needs of Logistics Service Providers
Figure 1. Information needs of companies in the supply chain (Ratliff & Nulty 1997)
in the whole process. Importance of planning is this question helps a company to determine, for
emphasized in the cases where the transportation example, the accuracy of the forecast. Secondly,
task is new to the company. The development of the time scale for the forecast has to be formed.
information technology has made it possible to The time scale for forecasts can be long, mid or
control transportations nearly real-time. Products short. One challenge is to find the most suitable
and services are produced, supplied and consumed forecasting technique. Fourth, a company needs
more and more through an (electronic) information to decide on the information the forecast is based
network. Transport planning and control systems on; it depends on the purpose of the forecast, the
can be integrated into the company’s ERP or SCM accuracy level required, and the resources that
system. The most typical information elements, have been reserved for forecasting. Finally, the
which are exchanged between various parties, are form of the forecast presentation and the accuracy
information concerning the customer, the product of forecast have to be solved.
and the order. In order to achieve a supply chain Logistics companies need forecast information
that is as efficient as possible, each party must of their partners’ planned deliveries, so they can
commit itself to the interactive collaboration and reserve an adequate amount of resources (vehicles,
information reporting. labour) for each time period.
ETA (Estimated Time of Arrival) is important
Information elements essential information for logistics companies. It is used to
for capacity Planning indicate the estimated arrival time to the desti-
nation. ETA illustrates, for example, the arrival
The following text presents five different informa- time when the control of the transport vehicle or
tion elements which are considered important for transport unit transfers to the logistics company.
the logistics company’s capacity planning. Without this information, it is very difficult for
Forecasting can be seen as the main ground a logistics company to reserve enough resources
for planning and decision-making in a company. (such as labour) for actions that are needed for the
Forecasts are based on presumptions and they can handling of the arriving products.
prove to be wrong or they can be affected by factors Information concerning changes is also essential
that cannot be seen beforehand. The longer the time for the capacity planning of logistics companies.
scale of the forecast, the bigger the uncertainty Changes can be, for example, related to the schedule
(Lysons & Farrington 2006). Lysons & Farrington or the route in use. Information concerning changes
have defined six questions that a company should received as early as possible helps companies re-
consider before making forecasts. First, the pur- measure their resources and make other necessary
pose of the forecast should be decided. Answering rearrangements related to companies’ activities.
122
Information Needs of Logistics Service Providers
123
Information Needs of Logistics Service Providers
elements that were previously presented. The study e-mail. The primary notion was that most of the
revealed that the typical supply chain in Finland companies use many different applications to
is not very transparent. The table indicates that run their businesses. Because of the differences
the shipper receives information well but the in the IT levels of the studied companies, it is
other actors in the chain do not. There is a lack not possible yet to turn all the information in the
of information concerning forecasts, location and chain electronic. It is rather usual that even if
changes. Two of the interviewed companies also some data is sent electronically, it can become
told that they would like to receive information a paper version at some point of the chain. The
about their customers’ possible volume increase. objective should be to keep the information flow
One company told that it does not have the load- electronic all the way in the chain. Then also the
ing instructions. The most desirable information manual processes would diminish as would the
concerned the changes. All of the interviewed potential for mistakes.
companies would like to have information when During the last 20 years, the principle of
some changes emerge and they wish that this detailed visibility in the logistic chain has been
information would be available earlier than it is successfully applied in numerous industrial com-
today. Forecasts were also seen as important al- panies. Similarly like manufacturing companies
though many of the companies did say they were also LSPs have to plan the use of their capacity,
satisfied with the amount of information today. for example, to allocate enough employees or
The desired time scale of forecasts varied from transportation capacity for each day. According
one to 20 days. Usually forecasts were wanted to the case study conducted in Finland, there is
for 1–2 weeks ahead. evidence that the information sharing in supply
Many of the studied companies were rather chains could be improved. The influences of bet-
satisfied with the current information sharing. ter collaboration and more effective information
This is quite bizarre because for example only a transfer could be further studied by case studies.
few received information about their customers’ Perhaps the starting level of information sharing
needs, other than the actual order. It is possible at some chain could be first evaluated. Then the
that many of the companies are not fully aware processes in the chain could be studied closely and
of the benefits the increased transparency would the information distributed could be increased or
bring to the supply chain. intensified other ways. At the end, the effective-
Companies were also asked if there is some ness of the starting level and the end level could
information they would like to receive in the be compared.
future. One topic was raised above others and it The greatest challenge concerning the logistics
was the need for more accurate information. Too information is the culture of information sharing in
often the information received was not as accurate the company. This could be avoided by close, reli-
as it should have been. Another important point able relationships and by highlighting the benefits
was that information should be received earlier of information sharing (Hoyt & Huq 2000).
than it is today. At this moment, some essential
information is received only few hours before.
Naturally, this causes problems to the production concluSIon
planning of the companies.
The IT level of the companies varied quite a lot Companies within a supply chain need informa-
but also the size of the companies varied. Some tion about forecasts, changes, the estimated time
companies controlled almost all of their processes when the cargo is arriving, location and condition
electronically when some companies rely just on of the items. Forecasts are the base of all planning
124
Information Needs of Logistics Service Providers
and decision-making. Forecasts are composed of if technology adoption figures are concerned
assumptions so they can prove to be wrong and (Statistics Finland 2008). Interestingly, the EDI
they can be affected by such things that cannot be adoption level in the transport sector is lower than
foreseen (Lysons & Farrington 2006). national average even though transport operations
The case study presented in chapter 4.2 re- require a considerable amount of documentation
vealed the lack of information sharing. ETA is very and information transfer.
important for logistics service providers, offering The main conclusion of this chapter is that lo-
the information about when the transported items gistics service providers need more information in
arrive in their destination. The study points out order to manage their operations more efficiently.
that information concerning ETA is quite well Practically every company that was presented in
shared. Information about the changes in plans is the case study lacks information it would need.
essential for the capacity planning of companies. By adding just the amount of information shared,
Many of the companies in this case study did not is not enough. The information shared should also
receive enough information of changes and this be truly beneficial; unnecessary information may
information element turned out to be the most slow down the operations in the supply chain.
desired data for the companies. The information Also information accuracy and timeliness are
regarding the location of the transported items important attributes for information that is shared
is also important for the companies in a supply in supply chain.
chain. Real-time information about the location
makes it possible to optimize the transportations,
especially when new transport tasks occur. Ad- referenceS
ditionally, the information about the condition
of the transported items is needed when there Airos, E., Korhonen, R., & Pulkkinen, T. (2007).
are changes in plans. Forecasts were also seen as Satelliittipaikannusjärjestelmät (Satellite naviga-
important although many of the companies did say tion systems). The Finnish Defence Forces. Rii-
they were satisfied with the amount of informa- himäki. Retrieved June 5, 2009 from http://www.
tion today. Finally, almost all of the companies mil.fi/laitokset/pvtt/satelliittipaikannus.pdf
wished that they would receive the information Choy, K. L., So, S. C. K., Lau, H. C. W., Kwok,
earlier than they do today. S. K., & Chan, F. T. S. (2006). Development of an
Logistics service providers co-operate with integrated logistics information system for third
many branches of industry, which fundamentally party logistics facilitators. International Journal
limits their possibility to focus on certain ICT of Business Performance Management, 8(2/3),
standards. It is probable that LSPs need to cope 170–193. doi:10.1504/IJBPM.2006.009035
with several standards also in the future, which in-
creases their operational complexity (Kekäläinen Christopher, M. (1992). Logistics and supply chain
2006). Based on statistics, EDI was used by only management: Strategies for reducing costs and
13 per cent of all companies in Finland in 2006 improving services. London: Pitman Publishing
(Statistics Finland, 2008). An interesting observa-
Fabbe-Costes, N., & Jahre, M. (2008). Supply
tion is that the use increases steadily according
chain integration and performance: a review
to the size of the company in terms of employed
of the evidence. The International Journal
personnel. Companies employing over 100 profes-
of Logistics Management, 19(2), 130–154.
sionals use EDI in almost 50% of their operations.
doi:10.1108/09574090810895933
Furthermore, statistics show that the transport
sector is on the lower end of the industry branch
125
Information Needs of Logistics Service Providers
Främling, K. (2002). Tavaravirran seuranta Laaksonen, P., Nelimarkka, P., & Nyman, M.
osana Internet-pohjaista tuotetiedon hallintaa. (2004). Logistiikan tulevaisuus Itämeren alueella.
(Tracking of deliveries as a part of Internet based Yhteenveto asiantuntijoiden kirjoituksista ja
product data management). Retrieved April keskustelutilaisuudesta 16.8.2004 (The future of
15, 2009 from http://dialog.hut.fi/publications/ logistics in the Baltic Sea area. The summary of
TiekeArtikkeli.pdf the articles and discussion by experts Aug 16,
2004). Retrieved May 4, 2009, from http://www.
Gopal, C., & Cypress, H. (1993). Integrated Dis-
tedim.com/default.asp?file=819
tribution Management: Competing on customer
service, time and cost. The Business One Irwin. Li, G., Yang, H., Sun, L., & Sohal, A. S. (2009).
The impact of IT implementation on supply chain
Helo, P., & Szekely, B. (2005). Logistics infor-
integration and performance. International Jour-
mation systems – An analysis of software solu-
nal of Production Economics, 120(1), 125–138.
tions for supply chain co-ordination. Industrial
doi:10.1016/j.ijpe.2008.07.017
Management & Data Systems, 105(1), 5–18.
doi:10.1108/02635570510575153 Logistiikka (2001). Paikannuksen merkitys ta-
varaliikenteessä (The meaning of positioning in
Hoyt, J., & Huq, F. (2000). From arms-length to col-
cargo transport). Logistiikka – The Magazine of
laborative relationships in the supply chain: an evo-
Finnish Association of Purchasing and Logistic,
lutionary process. International Journal of Physi-
6, 36–38.
cal Distribution & Logistics Management, 30(9),
750–764. doi:10.1108/09600030010351453 Lysons, K., & Farrington, B. (2006). Purchasing
and supply chain management. Pearson Educa-
Kalakota, R., & Robinson, M. (2000). E-Business
tion Limited.
2.0 Roadmap for Success. Reading, MA: Addison-
Wesley. Mäkinen, T., Mäntynen, J., & Vanhatalo, J. (2005).
Logistiikka ja kuljetusjärjestelmät (Logistics and
Kauniskangas, M. (2007). Asiakkaasta partneri
transport systems (Tech Report 38.) The Tampere
(From customer to partner). Logistiikka – The
University of Technology, Faculty for transport
magazine of Finnish Association of Purchasing
technologies.
and Logistics, Iss. 5.
Nevalainen, E. (2006). Kuljetusriskien hallinta
Kauremaa, J., & Auramo, J. (2004). Logistii-
(Management of transportation risks). Pohjola
kan sähköisten tieto- ja viestintäteknologioiden
Insurance Ltd. Retrieved January 7, 2009 from
hyödyntäminen – Kokemuksia suomalaisista
http://www.finva.fi/eoppiminen/materiaalit/Ma-
yrityksistä (Utilization of electronic information
teriaali2006/Nevalainen_luento_2006.pdf
and communication technologies in logistics – Ex-
periences from Finnish companies). Technology Pohto, P., Sihvola, I., & Kallio, J. (2005). Logis-
Review 154/2004. Tekes. tiikan sähköisten tieto- ja viestintäteknologioiden
hyödyntäminen – Kokemuksia Euroopasta (Utili-
Kekäläinen, H. (2006). Logistics technology
zation of electronic information and communica-
roadmap for e-business. Technology Review
tion technologies in logistics – Experiences from
189/2006. Tekes.
Europe). Technology review 173/2005. Tekes.
126
Information Needs of Logistics Service Providers
Pulli, H., Kajander, S., & Tapaninen, U. (2007). Salmela, H., & Jahnukainen, M. (2003). IT enabled
Satamasidonnaisten yritysten tietotarpeet. (Infor- global customer service: findings and conclusions
mation needs of port related companies). Research from six case studies, In Reponen, T, (ed.), Infor-
report of University of Turku, Centre of Maritime mation Technology-Enabled Global Customer
Studies, B:149, Turku Service. Hershey, PA:Idea Group Publishing.
Punakivi, M., Aminoff, A., Auramo, J., Pajunen- Siltala, T. (2007). RFID ei vielä tartu (RFID does
Muhonen, H., Lehtinen, J., & Yrjölä, H. (2001). not spread yet). Retrieved December 20, 2009,
Karkelo – Kartoitus elektronisen liiketoiminnan from http://www.tietoviikko.fi/taustat/kaikki_ju-
logistiikasta (Survey of the logistics of electronic tut/article136836.ece
business). Retrieved February 3, 2009, from
Singh, J. (1996). The importance of infor-
http://www.tuta.hut.fi/logistics/publications/
mation flow within the supply chain. Logis-
Karkelo.pdf
tics Information Management, 9(4), 28–30.
Ratliff, H. D., & Nulty, W. G. (1997). Logistics doi:10.1108/09576059610123132
composite modelling, In The planning and sched-
Spekman, R. E., Kamauff, J. W., & Myhr, N.
uling of production systems–Edited by Artiba,
(1998). An empirical investigation into supply
A. & Elmaghraby, S.E. Chapman & Hall (eds.),
chain management: a perspective on partner-
Methodologies and applications.
ship. International Journal of Physical Distribu-
Reinikainen, P., Mäntynen, J., & Rantala, J. (1997). tion & Logistics Management, 28(8), 630–650.
Logistiikan perusteet (The basics of logistics). doi:10.1108/09600039810247542
Tampere, Finland: Tampere University of Tech-
Statistics Finland. (2008). Use of information
nology, The Faculty for Transport Technologies.
technology in enterprises 2008. Statistics Finland,
RE:view, 27.
Helsinki.
Rytsy, A. (2007). RFID veti väkeä Logistics 2007
Talvela, J. (2006). Lyhyen kantaman langattomat
-tapahtumassa (RFID raised interest in Logistics
tekniikat (Short range wireless techniques). Kotka,
2007 event). Logistiikka – The Magazine of Finn-
Finland: Kymenlaakso University of Applied Sci-
ish Association of Purchasing and Logistics, 5,
ences. (Research Article 2007).
38–39.
WEF. (2008). The Global Competitiveness Report
Salmela, E., Nieminen, L., & Lukka, A. (2006).
2008–2009. London: Palgrave Macmillan.
Prosessien kehitys ja ICT:n hyödyntäminen
hankintatoiminnassa, logistiikassa ja toimitus- Zhang, Z., Cheng, T., & Yan, B. (2006). A Portal
ja kysyntäketjun hallinnassa (Development of of Logistics Service Provider to Integrate Sup-
processes and utilization of ICT in purchasing, ply Chain. In Proceedings of the 2006 IEEE
logistics and supply chain management.). Re- Asia-Pacific conference on Services Computing
trieved February 17, 2009, from http://partnet.vtt. (APSCC’06).
fi/serviisi/tiedostot/serviisi_loppuraportti.pdf
127
128
Chapter 7
IT Audit for Information
Logistics
Malgorzata Pankowska
University of Economics, Katowice, Poland
aBStract
The main goal of the chapter is to consider how information logistics in business organization is sup-
ported by standards and best practices of auditing. The first part of the chapter covers the discussion of
what information logistics is and how it is developed within and supported by business organizations. The
second part comprises considerations on Information Systems Audit and Control Association (ISACA)
information technology audit standards and practices that support information logistics development
and realization. Particularly, CobiT, ITIL, ISO/IEC 27002, Val IT as well as the Sarbanes-Oxley Act
and ITAF model are analyzed in the aspect of information logistics. The third, and last part covers pre-
sentation of information logistics development in data warehousing and data warehouse management
and auditing problems.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
IT Audit for Information Logistics
129
IT Audit for Information Logistics
material goods. Therefore, information production ticipant in a correct sequence, ensuring that all
and transfer is aimed to be realized independently fulfill their required contributions, taking default
from goods’ generating and assembling. As it is actions when necessary. A workflow management
in the classical science of management, an infor- system is an active system that manages the flow
mation supply chain is said to be vertically inte- of business processes performed by multiple
grated if its components (i.e. information sources, persons. It gets the right data to the right people
databases and information systems) belong to a with the right tools at the right time. The descrip-
single firm. Nowadays, more frequently, the sup- tion of selected workflow systems according the
ply chain is operated by several autonomous, but following scheme covers:
interdependent companies. There, interdependent
information producers receive information from • modeling elements (e.g. workflow, roles,
different sources, process information at different applications, data), they determine the ex-
data centers and eventually receive or subscribe at pressiveness of a workflow management
the data warehouses to assemble it in the reports system,
or to generate decisions. Cross-organizational • tools, languages and application program-
logistical management systems are supported by ming interfaces (APIs). Workflow model-
implemented workflow system. Masters suggests ers as well as workflow management sys-
that a primary issue to a workflow management tem users have to interact with a system
system is resource allocation. The whole concept of through user interfaces,
users and roles exists to map people to the opera- • system architecture and implementation.
tions that they are capable of performing to advance Workflow types are instantiated during
a business objective. The Workflow’s Manage- run time by workflow management system
ment Coalition’s glossary defines workflow as (more specifically by so-called workflow
“the automation of a business process, in whole engines) in order to execute business pro-
or part, during which documents, information of cesses. Issues like distribution, scalability
tasks are passed from one participant to another and reliability of computer systems are
for action, according to a set of procedural rules”. discussed here as well as openness and in-
From a workflow perspective, a participant can teroperability of business processes,
be a human, an application, a machine or another • application area specifics. In this part of
process or workflow engine. the description, the functionality for spe-
The workflow process is traditionally defined cific application semantics is reported
in office terms – moving the paper, processing (Jablonski & Bussler, 1998).
the order, issuing the invoice. But the same prin-
ciples and tools apply to filling the order from the Summarizing, the workflow process benefits
warehouse, assembling documents, parts, tools are following:
and people. Workflow management software is
a proactive computer system, which manages the • simplification of business processes and
flow of work among participants, according to making information processing operations
a defined procedure, consisting of a number of simpler and less bureaucratic,
tasks. It coordinates users and system participants • integration – cross-functional and interor-
together with the appropriate data resources, which ganizational information flow, interoper-
may be accessible directly by the system or offline, ability ensurance,
to achieve defined objectives by set deadlines • standardization – using standard proce-
(Jablonski & Bussler, 1998). The co-ordination dures, information formats, semantics, in-
involves passing tasks from participant to par- teroperability implementation,
130
IT Audit for Information Logistics
• concurrency of operations – moving away • services: groups of assets which act to-
from serial operations of information pro- gether to provide a particular function such
cessing towards parallel working, as computing and communications servic-
• variance control – ensuring high quality and es, general utilities, e.g. heating, lighting,
avoiding waste information garbages, power, air-conditioning,
• automation – to improve effectiveness and • people: their qualifications, skills and ex-
efficiency, perience – the knowledge and skill capital
• resource planning – to remove bottlenecks of the organization. This is a particularly
in information channels and to ensure a complex process for which external con-
smooth flow of information. sultancy help might be sought,
• intangible assets such as reputation and
The capacity of workflow process sets the maxi- brand (Calder & Watkins, 2006).
mum volume of information products that can be
delivered to the final consumer in a given time. As ISO/IEC 17799 points out that, the pro-
cedures need to cover all formats of information
Information as an asset assets, both physical and electronic. There should
be procedures for the following types of informa-
Information as a valuable resource in economical tion processing activities:
system is included under the following processes;
creation, registration, storing and delivering to • acquisition of information,
recipients in time in appropriate forms under reason- • copying (electronically, by hand and
able costs. The types of assets that ISO/IEC 17799 through reading and memorizing),
identifies as needing to be inventoried include: • storage, both electronic and in hard copy,
• transmission by fax, post, e-mail,
• information assets: databases and data files, • transmission by spoken word, including
other files and copies of plans, system docu- mobile phone, voicemail and answering
mentation, original user manuals, original machines,
training material, operational or other sup- • chain of custody and logging of security
port procedures, continuity plans and other events, particularly important when deal-
fall-back arrangements, archived informa- ing with computer-related crime,
tion, financial and accounting information, • destruction, when no longer required
• software assets: application software, sys- (Calder & Watkins, 2006).
tem software, development tools and utili-
ties, e-learning assets, network tools and The term information is a static stock concept.
utilities, It suggests inventories of different kinds of knowl-
• physical assets: computer equipment (in- edge as valuable assets. The term communication
cluding workstations, notebooks, PDAs, is a dynamic flow; it is associated with flow of
monitors, modems, scanning machines, messages and exchanges of information, knowl-
printers), communications equipment (rout- edge and values. The value of information cannot
ers, cell phones, fax machines, voice con- be a priori estimated, however, there are certain
ferencing units), magnetic media, other characteristics of information that must be present
technical equipment (power supplies, air- if the information is to be useful. In the model of
conditioning units), furniture, lighting, recipient and provider of information:
other equipment,
131
IT Audit for Information Logistics
• from the point of view of the provider: five types of processes in information production
the information is flowing to the intended concerning their flow time characteristics:
recipient and the confidentiality, integ-
rity and availability of the information • information order processing, where the
have not been compromised, the informa- customer asks the information producer
tion provider is interested in ensuring the to deliver a certain product (the flow time
generation, validation and propagation of performance is measured as the interval be-
information, tween the moment the customer expressed
• from the point of view of the recipient: the demand and the moment the product is
information has not been compromised delivered),
and the source of information should be • reporting process based on data that the
validated and known as reliable, the infor- organization has gathered, either from the
mation should be selected, integrated and customer or other sources,
acquired. • customer’s reaction process to the report-
ing process,
In information production, particularly, when • collecting process, in which data is gathered
the effect of production is a decision, the main ca- to be used in order to report processes,
pacity bottlenecks are the employees. Employees • dissemination process, in which gathered
play a different role in information production information is distributed to known and
than in material production. They are both on the anonymous recipients, authorized or for
capacity oriented side as well as on the material free.
oriented side. Flow of information is included in
the implemented business process. The material Information production processes are initiated
product life cycle consists of the following stages: by customers i.e. information consumers. Eco-
engineering, fabrication, assembling, delivery, nomic situation causes a certain demand for the
installation and maintaining. Information system particular information; people are able to collect
life cycle covers conceptualization, analysis and more and more information and to pay more for
design, implementation and evaluation as a base it. Government legislation concerning a certain
for further reconstruction. According to Single- financial information product will influence the
ton (2009) information life cycle management changes in this demand as well as promotion
includes more than data, it comprises compliance, actions and information product adevertising
information security, tools, business continu- websites. The information product demand can
ity, disaster recovery, appropriate policies and be controlled by the business organization itself.
procedures. To effectively manage information, For example, the controlled demand is formu-
all of it must be identified, relevantly collected, lated among the reporting processes and reaction
properly classified and effectively controlled processes, so the capacity management should be
(Singleton, 2009). aware of the relationship and plan the shipment
Information production processes are particu- of reports in such a way that demand is flattened.
larly well developed for bureaucratic, administra- However, actions undertaken by any certain de-
tive decision making. Administrative decision partments may increase the demand. Generally,
process covers information intake, data gathering, the information demand side is driven by access
judgment for completeness, processing and in- to advanced infrastructure, ability to consume
forming about the decision, and edition of a paper i.e. utilize the information for the decision mak-
document. The analysis allows distinguishing ing, competitive pricing, content driven by user
132
IT Audit for Information Logistics
133
IT Audit for Information Logistics
134
IT Audit for Information Logistics
project completions, resource usage, pro- through formal and informal channels and they
cess performance and service delivery. IT need to be structured and organized so that the
governance mechanisms should translate management knows exactly what information is
implementation strategies into actions to be provided. Information will arrive through
and measurements to achieve these goals formal channels including formal meetings,
(Moeller, 2008). management reports, financial reports, proposals,
management information systems, regular brief-
In the document “IT Control Objectives for ings, structured presentations and board meeting
Sarbanes-Oxley” the IT Governance Institute paper and other documents. Information will arrive
discusses the IT control objectives that might be through informal channel including telephone,
considered by business organizations. Interna- emails, informal discussions, informal meetings
tional standards and good practices such as ISO with management, information gathering. In SOX
17799, ITIL, the Sarbanes-Oxley Act play a vital it is important to set up a structured process for
role in ensuring the appropriate governance. handling information throughout the organization
and ensuring that information that needs to be
Sarbanes-oxley act communicated to the board members is provided
in an effective manner.
The Sarbanes-Oxley Act (SOX) is a large com-
plex piece of legislation covering many areas. ItIl
Section 404 of SOX covering reviews of internal
accounting controls has received perhaps the most Information Technology Infrastructue Library
attention and compliance activity. Section 404 (ITIL) is a detailed framework or description
covers processes where an enterprise is respon- of a number of significant IT practices, with
sible for reviewing, documenting and testing its comprehensive checklists, tasks, procedures and
own internal accounting controls. Section 404 responsibilities that are designed to be tailored
Compliance Review Work Breakdown Structure to any IT organization (Moeller, 2008). The use
includes purchase order management, inventory of ITIL best practices should help an enterprise
management, warehouse management, demand to better manage and operate all aspects of its IT
planning, order processing, shipping and receiv- resources and ensure stronger SOX internal con-
ing, logistics management, billing and invoicing, trol compliance. ITIL best practices are based on
accounting systems, information systems, human the widely recognized concept that information
resources, and internal audit (Moeller, 2008). Ac- is the most important strategic resource that any
cording to SOX information access management enterprise must manage (Aligning…, 2008). The
covers information filtering, timely submission quality of an enterprise’s IT systems and services is
of information, formal and informal information the key to the collection, analysis, production and
channels, information framework development distribution of the information on the operational
and regular briefing sessions realization. Man- and strategic level. ITIL supports those activities.
agers to operate effectively must have access ITIL elements concern:
to accurate and timely information to support
proper analysis and decision making. In order to • planning and delivery of high quality IT
achieve it, it is necessary to ensure existence of services,
an effective information framework throughout • service support and maintenance,
the organization. Top managers should take re- • IT infrastructure management including
sponsibility for ensuring that they have the right the testing, installation and deployment of
amount of information. Information will arrive IT components and services,
135
IT Audit for Information Logistics
136
IT Audit for Information Logistics
technical and business resources to deliver the have been defined, they need to be monitored to
required capabilities. ensure that actual delivery matches expectations
Val IT model IT–enabled investments are (CobiT …, 2007). Within the CobiT framework
managed as a portfolio of investments. They are the responsibility domains of plan, build, run and
considered as a certain scope of activities that are monitor are specified. So, the business people are
required to achieve business value, therefore value responsible for properly defining functional and
delivery practices are assumed to be evaluated and control requirements and using automated ser-
managed as different categories of investments. vices, and IT people are responsible for automating
Value delivery practices are required to engage all and implementing business functional and control
stakeholders and assign appropriate accountability requirements and establishing controls over the
and measurement for the delivery of capabilities integrity of computer software applications. The
and the realization of business benefits. The goal strong point of CobiT model is the including of the
of value governance in Val IT model is to optimize enterprise strategy development and the business
the value of an organization’s IT-enabled invest- requirements which require information services
ments by establishing the governance, monitoring that imply the information criteria and influence
and control framework, by providing strategic the governance requirements.
direction for the investments and by defining
the investment portfolio characteristics. In Val ISo/Iec 27002
IT model, the value is perceived as a result of IT
investments. Proponents of this approach focus The guiding principles in ISO/IEC 27002: 2005
on IT implementation and they do not see busi- are the initial point for implementing information
ness information as a source of value as well as security. They rely on either legal requirements
they do not consider information management or generally accepted best practices. The interna-
and information logistics for value creation. This tional standard was published by ISO (www.iso.
weakness of such an approach can cause the IT org/iso/home.htm) and the IEC, which established
investment to be perceived as a goal in itself. a joint technical committee, ISO/IEC JTC 1. The
historic source for the standard was BS 7799-1,
cobit of which essential parts were taken in the de-
velopment of ISO/IEC 17799:2005 Information
CobiT is a globally accepted framework for IT Technology – Code of Practice for Information
governance based on industry standards and best Security Management. It was developed and pub-
practices. Once implemented, it is aligned effec- lished by the British Standards Institution (BSI),
tively with business goals and better directs of the labeled as BS 7799:1: 1999. The goal of ISO/IEC
use of IT for business advantage (Cascarino, 2007). 27002-2005 is to provide information to parties
CobiT provides a common language for business responsible for implementing information security
executives to communicate goals, objectives and within an organization. It can be seen as a best
results with audit, IT and other professionals. practice for developing and maintaining security
CobiT model assumes that the enterprise strategy standards and management practices within an
should be translated by business into objectives organization to improve reliability on informa-
related to IT-enabled initiatives (the business goals tion security in interorganizational relationships.
of IT). These objectives should lead to a clear Measures included in ISO/IEC 27002 comprise
definition of IT objectives, which in turn define protection and non-disclosure of personal data,
the IT resources and capabilities as well as the protection of internal information and intellectual
enterprise architecture for IT. Once the aligned property rights. Best practices mentioned in the
137
IT Audit for Information Logistics
standard include information security policy, as- improved information access and higher-quality
signment of responsibility for information secu- decision support (Moeller, 2001).
rity, problem escalation and business continuity Data warehouse assemble data from all over
management. Although the standard focuses on an organization – from legacy systems, desktop
information security management, several critical databases, spreadsheets, credit reports, sales calls
success factors should be considered. First and and more. This collective data structure makes a
the most important is that the security policy, larger amount of summarized data available to a
its objectives and activities should reflect the wider group of users that would be possible with
business objectives and cultural aspects of the any of the underlying systems. It can be mined
organization. Other factors are connected with and queried in ways that are useful for decision
the operational management for security assur- making through a common, centralized database
ance, therefore senior management engagement, or through distributed databases and easy-to-use
risk management, marketing of security and users query software. The data warehouse is a combina-
trainings, security control contracting and perfor- tion of operational and historical data, repackaged
mance measurement are considered. The standard to accommodate knowledge workers who want to
does not clearly specify the need of information report, analyze, or drill down without having to
logistics development for information assurance access operational files directly. Data warehouse
for business. The issues are only mentioned in has four major architectural components:
the business objectives specification and business
continuity management. • data extraction and transformation
facilities,
• data movement and triggering facilities
data WarehouSe audIt • database management systems
and further reSearch • decision-support and analysis tools (Figure
of Info logIStIcS 1).
138
IT Audit for Information Logistics
operational systems, source applications, dimen- a data mart. The dimensional data warehouse is
sional data warehouses, ETL (Extract Transform usually implemented on a relational database
Load) software, front-end software (Inmon, 2002, management system.
Inmon, 2005). Taking into account Michael Por- Extract Transform Load (ETL) software is
ter’s value chain (1985), the operational systems used to move data into data warehouse tables.
are the inbound logistics systems and the sources This process involves fetching data from source
applications that support the execution of a busi- system (extract), recognizing it as required by
ness process, recording business activity and the star schema design (transform) and inserting
serving as the system of records. Operational it into warehouse tables (load). ETL may be ac-
systems may be packaged or custom-built applica- complished using specialized, packaged software,
tions. Their databases may reside on a variety of or by writing custom code. The ETL process may
platforms, including relational database systems, rely on a number of additional utilities and data-
mainframe-based systems, or proprietary data bases for staging data, cleansing it, automating
stores. For some data, such as budgeting informa- the process, and so forth.
tion, the system of record may be as simple as a Front-end software is utilized to support the
user spreadsheet. The most important part of the outbound logistics of information. Front-end soft-
value chain model of M.Porter is the operation. In ware means any tool that consumes information
data warehousing operation means transformation from the data warehouse, typically by issuing an
of entrance information and archiving temporarily SQL query to the data warehouse and presenting
in the Operational Data Store (ODS) or for a long results in a number of different formats. Most
time in the data warehouse. Sometimes data are architectures incorporate more than one front-end
transferred to the dimensional data warehouse, product. Common front-end tools include busi-
which is a database that supports the measurement ness intelligence software, enterprise reporting
of enterprise business processes. It stores a copy software, ad hoc query tools, data mining tools,
of operational data that has been organized for decision support systems (DSS) and group deci-
analytic purposes, according to the principles of sion support systems (GDSS) and basic SQL
dimensional modeling. Information is organized execution tools. These services may be provided
around a set of conformed dimensions, supporting by commercial off-the-shelf software packages
enterprise-wide cross-process analysis. A subject or custom developed. Front-end software often
area within the data warehouse is referred to as ensures additional services, such as user- and
139
IT Audit for Information Logistics
140
IT Audit for Information Logistics
• setting the backup and recovery procedures interchange with the destination system. Filter-
and update the security plan consequently. ing consists of selecting, according to specific
criteria, only a part of the information from the
Problems of quality lack in data should be source system. Among the most usual criteria
reported to those responsible for the legacy are temporal interval, geographic area etc. The
system from which they come. Specifications process can be performed simultaneously with
to transform data from the source systems to extraction. Cleaning processes are intended to
the warehouse should be documented, including eliminate inaccurate or inconsistent information
the way, order and other conditions to execute by means of a number of checking and correcting
each of them. When the warehouse is updated operations.
from several sources, the information should be The data exploration from the warehouse is
previously synchronized in order to maintain the seldom a direct copy of the data found in the data
data coherence. Decomposing the data warehouse warehouse. Instead, the exploration warehouse
architecture results in three kinds of units: starts with a subset of the data found in the data
warehouse. The primary purpose for an exploration
• storage elements, intended to house system warehouse is the creation of assertions, hypotheses
implementation and observations. A data mining warehouse has
• data handling procedures, also known as the purpose of proving the strength of the truth
handling services of the hypotheses. The exploration warehouse
• human factor, consisting of final users and is optimized on breadth while the data mining
technical staff involved in the project. warehouse is optimized on depth. The purpose
of an exploration warehouse is to provide a
The data warehouse should take into account foundation for heavy statistical analysis. Once
the diverse types of information available (text, the exploration warehouse has been built, there
images, fax, video, sounds) as well as information will be no more contention problems with the
coming from external sources. Source data, both data warehouse. Statistical analyses can be run all
of internal and external origin, must be completely day long and there will be no contention issues
documented, including the data model on which because the processing that is occurring is hap-
they are based. If the models do not exist, they must pening on separate machines. The data warehouse
be obtained, either manually or automatically, by can be compared to the huge factory of informa-
means of specific reverse engineering tools. This tion, so as such it demands appropriate inbound
will be necessary to carry out the data-mapping and outbound logistics. Therefore, Information
phase in the life-cycle. Technology and Information Systems auditors
The process of the data acquisition can be should focus on the development of methods and
broken down into data source identification and standards to ensure control over the processes of
data extraction. As soon as the location of neces- information acquisition, processing, storing and
sary data has been identified, data must be read transferring. Particular attention is required for
and unloaded, using for this purpose the systems the entrance processes, on the selecting, filtering
that store them. If the destination for extracted and cleaning the information, because otherwise
information is a system different from the original, the prophetic utterance Garbage-In-Garbage-Out
consideration can be made about compressing at (GIGO) will be fulfilled.
the same time as extracting, in order to reduce
141
IT Audit for Information Logistics
142
IT Audit for Information Logistics
143
144
Chapter 8
Information and
Communication Technology
in Logistics as a
Comparative Advantage
Roman Gumzej
University of Maribor, Slovenia
Martin Lipičnik
University of Maribor, Slovenia
aBStract
In a time, when the economic crisis is filling the news, it may seem hard to even think about improvements
in terms of research and development, since there are lacking funds even for the reproduction. However,
the last economic revolution was born in a crisis. Therefore it is sensible to look at the current situation
as an opportunity for the next economic revolution,. bringing the economy a new cycle of development.
The potentials for growth with the globalization have been mainly exploited so far, bringing consider-
able negative consequences into our lives and our environment that have triggered anti-globalist and
ecological movements around the world. Now it’s time to think how to make things better and more
humane. The main goal of this chapter is to lay the foundation for an advanced-research technological
platform for logistics applications networks.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Information and Communication Technology in Logistics as a Comparative Advantage
Improving the existing logistics support especially stant high quality of products. In this chapter some
in production and transport has proven possible of the guidelines for using the ICT technology as
by integrating Information and Communication infrastructure in modern production and transport
Technology (ICT) with a well developed infra- systems of the future are outlined.
structure in the developed world (Ballou R.H., The goal of this contribution is to encourage the
2004). In other application areas appropriate systematic integration of modern ICT technology
partial solutions are also gaining importance. into contemporary logistics systems in production,
In developing regions of the world (e.g. China, transport and services. Due to great diversity of the
northern Africa) the logistics infrastructure is being application areas first the technologies and their
built intensively (Bartens S., 2008). Hence, we impact on the quality of service in their application
might say that the next economic “(r)evolution” areas are explored and categorized to determine
is probably going to be a logistic one and will be the critical factors, which must be observed for
founded on the use of modern ICT technology their successful integration. After that the layouts
(Straubhaar T., 2008). of future integrated solutions are defined for the
The European Union (EU), being a hetero- application areas under observation. Finally, based
geneous and strongly connected market, has on an example of good practice, a foundation for
invested largely into building transport nodes and reference technology platforms for logistics ap-
connections for different kinds of transport. The plications that would enable systematic modular
time has come for improvements of the existing integration of ICT technology into modern busi-
infrastructure and establishing/improving inter- nesses by application area is laid out.
faces with the global world. Since the European
economy is largely oriented at services and pro- Ict technology as Infrastructure
duction – the import of raw materials and product
components and export of products – the efficient In Figure 1 the schematic representation of the
use of its storage and transport infrastructures is ICT infrastructure and its application areas are
of utmost importance. On the other side flexibility presented:
in production through the achieved higher levels
in factory automation is gaining importance due 1. systems/devices with their services and data
to quick market changes and demand on lowering processing capabilities; here, on one side, a
production expenses while maintaining the con- very broad spectrum of embedded computing
145
Information and Communication Technology in Logistics as a Comparative Advantage
devices are being used, ranging from GSM subject to long-term improvement processes
transmitters and factory automation sensors through modern technology (BMVBS, 2009). In
and controllers to computing nodes for pro- particular the individual areas and their supporting
duction control, and computing systems for technologies are presented in the sequel.
enterprise resource planning on the other, The listed key ICT technologies provide
2. networks interconnecting computing sys- solutions for improvements that are possible /
tems/devices; here special emphasis is put necessary to improve the efficiency and QoS in
on WANs (Wide Area Networks) and VANs the mentioned key fields of EU economy. Since
(Virtual Area Networks), connecting hetero- they share several key technologies and affect
geneous networks among themselves, the majority of the population as well, a unified
3. applications of the mentioned infrastructure solution is sought for improving the overall logis-
in diverse areas of everyday life. The most tics of the EU economy. As an example, below a
integral and diverse applications thereof are scientifically-founded approach to the assessment
summed up with their logistics information of the listed goals for embedded intelligence and
systems for transportation, healthcare, power systems is briefly presented – the ARTEMIS
electronics, food processing and industrial platform (Artemis, 2008). It is a public-private
production (e.g. automotive industry), partnership led by the European industry with the
4. quality of service (QoS) is improved by goal to establish and implement a coherent and
the use of ICT technologies – among them integrated European research and development
especially dependability, availability and JIT strategy for Embedded Systems.
(Just in Time, i.e. Real-Time operation) are According to (ZVEI, 2007), the main goals
being given top priorities. to be achieved by the advanced use of the ICT
technology for improved logistics support and QoS
Since logistics is present in all the listed appli- in logistics systems are the same as the desired
cations (c.p. Figure 1) it is considered a complex properties of ARTEMIS reference architectures,
system and may hence benefit from the use of namely their composability, networking & se-
ICT technology. Being the driver of the supply curity, robustness, diagnostics & maintenance,
chain, it has some well defined limitations that integrated resource management, upgradeability
are being upgraded by new services, partly being and self-organization. Since computing systems
introduced by market changes and in part by the found in logistics applications are predominantly
advanced use of the ICT technology that can help embedded, the ARTEMIS guidelines are largely
improve the quality of the production system, the applicable to logistics systems.
products, and finally – quality of service (QoS)
to the customer. the artemIS technological
Platform
Strategic goals of logistics
management The concept of the ARTEMIS technological
platform (see Table 1) is to combine the technol-
According to (BMBF, 2007), main European ogy and science into a method for supporting the
strategic areas of logistics management improve- mentioned areas with state of the art ICT tech-
ment include transport, (waste) water manage- nological support. The goal of the platform is to
ment, power electronics, food growth/processing support minimal effort engineering by creating a
systems and industrial production systems. They generic library of abstract components, which are
represent the majority of EU economy and are being combined, based on common properties,
146
Information and Communication Technology in Logistics as a Comparative Advantage
147
Information and Communication Technology in Logistics as a Comparative Advantage
Of course all these require building appropriate foreseen track. For tracking purposes the GPS
infrastructure for gathering traffic information and information on the current position is often used
information dissemination. Since all these involve by transport companies to follow their vehicles.
diverse sensors, actuators, proprietary computing Usually, this tracking information is transmitted
devices as well as computing nodes of different through the GPRS (General Packet Radio Service)
kinds, complexities, and sizes, to achieve their data transmission protocol on the GSM (Global
interoperability, standardization is necessary. System for Mobile communications) network,
In general one may say that the balanced use since it is wireless and the transferred information
of traffic paths is best achieved by planning the does not require a broadband connection.
transports and building itineraries for the most ef- As opposed to road traffic, travel routes and
fective transport, considering cost, time and energy traffic densities in the air and on water are termed
consumption. With the aid of the provided traffic very differently, although the goals of traffic man-
information this goal can be achieved, provided agement are similar. Here, remote radar tracking
planning is done on-time. Because of limited systems, sensors and radio transmission play a
resources real-time constraints on transport play key role to ensure traffic safety. To assure safe and
a big role in ensuring timely traffic. stable communication lines among vessels and
In road-traffic the supporting ICT infrastruc- ground stations, besides VHF (high frequency)
ture comprises intelligent sensors and actuators radio transmission here satellite communications
for remote traffic monitoring and appropriate (e.g. ATS-I, ATS-III, Inmarsat (Moe R.L., 1988) and
signalization for traffic-flow regulation. The infor- Iridium) are used. Since security of the transferred
mation on traffic events and density, accumulated information is also an issue here, the datagrams
by the mentioned sensors, goes to traffic control at both ends are often encrypted. Besides voice
centers as well as traffic information centers messages, data transfers among ground stations
(e.g. government agencies, auto-clubs). In case and vessels in the air or on water are transferred.
of extraordinary situations (e.g. accidents, jams, They contain meaningful information about the
etc.) traffic control centers may take immediate identification of the vessel, its route and velocity,
regulative actions by triggering activities through type and quantity of its freight, etc. In order to
appropriate actuators. Simultaneously they can prevent electronic (and actual) hijacking of the
emit additional traffic-information messages vessels, these data need to be uniquely signed and
that may inform the travelers about the event to their contents protected by encryption. The freight
traffic-monitoring agencies (e.g. auto-clubs). By units are uniquely identified by their tags prefer-
running traffic-simulation/prediction models, they ably implemented using RFID (Radio-Frequency
can undertake additional measures and inform IDentification) technology because of greater
travelers about possible bypass routes or reduced data-capacity and easier scanning.
recommended speed of travel to avoid jams. The Table 2 sums up the main goals in transport. For
traffic-information messages are emitted through each of the goals the appropriate means are listed,
(digital) radio broadcast technology by the RDS categorized into methods, devices, and information
(Radio Data System) (prEN 50067: 1997) and management together with the pertaining standard-
TMC Traffic Messaging Channels (ENV 12313: ization efforts required. The main goal of transport
1997). TMC information can be used by in-vehicle management is to obtain sustainable transport mod-
GPS (Global Positioning System) satellite navi- els that would provide for transport predictability
gation systems for (re-)calculating a (new) route on the one side and improve its dependability also
based on the current position of the vehicle as through enhanced integrity and maintainability of
well as the information of traffic events on the transport infrastructure on the other.
148
Information and Communication Technology in Logistics as a Comparative Advantage
Table 2. Traffic improvement measures and their effect on critical QoS parameters
The mentioned means assuring dependability freight transportation these standardization ef-
and timeliness of transport are considered in forts have already been undertaken (e.g. transport
transport quality management. Transport energy unit tagging) and provide benefits to Warehouse
management, on the other side, is optimized with Management Systems (WMS). With improved
respect to timetables, efficiency and comfort dur- QoS in transportation, however, it should also
ing travel. Another noteworthy issue, which is facilitate Just-In-Time (JIT) production.
gaining importance as an optimization criterion,
is the quantity of harmful emissions and noise (Waste) Water management
produced by vehicles with respect to the demand
on the increasing quality of life and cleaner en- Water is becoming more and more valuable and
vironment. with it the concern about waste-water management
Standardization efforts in traffic include tag- is growing. Since the earth’s water system is cyclic
ging, security, freight units, application programs and because of extensive use of water in house-
used, open interfaces of networked systems, etc. holds, production systems and the agriculture,
With all kinds of passenger transportation the infor- one wishes to take part in the recycling process
mation on timetables, ticketing and connections are and support the natural regeneration as source of
customary. To accommodate multimodal travel, clean water also for future generations. Since only
the ticketing information should be standardized clean water is useful for the above purposes, and
in order to enable easy transport-switching. In there are limited supplies thereof on earth, waste
149
Information and Communication Technology in Logistics as a Comparative Advantage
water treatment systems have been devised in network of plants and the sewer system between
order to (1) clean waste water and reuse it or (2) them.
detoxicate polluted water from industrial plants, so In Table 3 most of the crucial infrastructure
it does not reach the environment. Table 3 shows and technologies associated with waste water
an overview of the goals and means one strives for treatment are listed. Part of them mainly concerns
with (waste) water management. These goals also planning and optimization of the plant and sewer
correspond with guidelines of (ZVEI, 2007). systems by providing support for simulation-/
Because of the complexity of waste water assistance-/autonomous-systems (e.g. Simba).
treatment systems, here in the planning process as These aim at the economical use of pipelines and
well as during operation of wastewater treatment sewers in order to reduce extensive use of ex-
plants and their sewer systems ICT technology is pensive procedures and bio-chemical substances
utilized (e.g. Simba (Alex J. and Jumar U., 2005)). (e.g. in agriculture automated watering-systems
On one hand one needs autonomous systems on analysis can cut on cost and water consumption
plants to monitor and control their operation, and and provide for a well balanced water-supply).
on the other one needs communication technology Another part of them deals with the diagnosis and
(preferably wireless) to be able to coordinate the maintenance of the plant / sewer system.
Table 3. (Waste) water management improvement measures and their effect on critical QoS param-
eters
150
Information and Communication Technology in Logistics as a Comparative Advantage
151
Information and Communication Technology in Logistics as a Comparative Advantage
sensor technology. Sensors attached to control / devices, information management and standard-
communication devices at different spots of the ization efforts required.
network provide us with information about its
status and possible exception conditions (e.g.: food growth/Processing
broken lines, overheating, plant outages, etc.).
These context-sensitive information should be Being the next most important energy source, food
joined by the network-management control sys- growth and distribution is crucial for ensuring
tems combining the possibility of devices / plants and sustaining the quality of life. In the future
monitoring with the possibility to take corrective the following measures shall improve the QoS
actions through interconnected actuators. in food growth (ZVEI, 2007):
The control software should be upgraded by
self-learning expert systems for preventive main- • system-level optimization in production
tenance, which would also provide the operator (ensuring performance and safety in food
with the ability to make informed decisions more processing with respect to the basic “qual-
quickly in case alert conditions require regulatory ity at low price” criterion),
action. The command input could be supplemented • automation-applications for food process-
by voice-control systems in order to additionally ing procedures (e.g.: mixing, pre-prepared
shorten response times and provide a more natural frozen food,…),
man-machine interface. ◦ data preparation for intelligent sys-
Appropriate for network maintenance, control tem guidance (based on information
technology should support the different control gathered from the current production
actions issued by control centers and enable de- processes),
centralized power-plant integration through their • man/machine interfaces (as in previous ar-
containerization. Regardless of the size some eas here also voice-command systems are
general data on a plant’s properties and status expected to improve response-times and
can be unified. As with wind power plants, based operator efficiency),
on these data, one may manage the plant system • sensor-systems for “inline” quality control
as a whole and develop plans for maintenance in correspondence with the pertaining stan-
and regulatory actions in cases of emergencies, dards, and
requiring shutting down / cutting off individual • machine hygiene (“cleaning in place”).
plants / lines without unwanted energy supply
outages. The crucial infrastructure and technologies
Standardization should provide for the in- associated with food growth and processing are
teroperability of sensors/actuators and control collected in Table 5. It sums up the main goals
devices as well as plants. It should also include in food growth. For each of the goals the ap-
energy consumption billing. Like with water propriate measures are listed, categorized into
management systems, the sensors on the network methods, devices, information management and
should enable remote billing where short range standardization efforts required.
radio transmission can be used to transfer these The goals in food growth mainly pertain to
data safely and securely while cutting on the cost automated internal logistics (acceptance and in-
of billing at the same time. coming goods control, storing goods), automated
Table 4 sums up the main goals in power packaging, filling and commissioning by employ-
electronics. For each of the goals the appropriate ing robots for manipulating soft and fragile food
measures are listed, categorized into methods, (e.g.: pastry, fruits and vegetables, drinks, etc.),
152
Information and Communication Technology in Logistics as a Comparative Advantage
Table 4. Power electronics improvement measures and their effect on critical QoS parameters
Table 5. Food growth improvement measures and their effect on critical QoS parameters
153
Information and Communication Technology in Logistics as a Comparative Advantage
RFID technology for tracking among production • operator-robot interaction (control systems
departments and tracking information standardiza- networking, visualization as well as voice
tion, “Manufacturing Execution Systems” offering control of the robots for easier handling),
system optimization on production level (e.g. SAP ◦ precise, intelligent sensor systems
ERP1 system for planning purchases, production with picture processing capability,
and cost calculation), temperature-controlled • diagnostic tools for heterogeneous system
logistics (uninterrupted cool-chain), etc. components as well as the production pro-
cess as a whole, and
Industrial Production Systems • virtual production process (production
process start as a “digital factory” to deter-
Being the next most important social component, mine critical factors and accommodate JIT
production systems are crucial for producing production).
added value and ensuring and sustaining the qual-
ity of life through it. In the future the following The crucial infrastructure and technologies
measures shall improve the QoS in production associated with production systems are joined in
systems (ZVEI, 2007): Table 6. Future applications of ICT technology
especially address:
• cooperating robot-systems (ensuring quick
response to market changes by reconfigu- • unique identification of products/parts,
rations in the production process), ◦ utilization of “intelligent” SW-agents
Table 6. Production systems improvement measures and their effect on critical QoS parameters
154
Information and Communication Technology in Logistics as a Comparative Advantage
for reactions on imprecise context classifying logistics sites for uniform handling
dependent formulations, especially and optimizing the individual logistics processes,
in combination with voice controlled standardization efforts have to be undertaken in
robot systems, order to make these systems and their components
◦ “Plug & Play” functionality and func- inter-operable for joined logistics.
tional safety, Based on the idea of the ARTEMIS platform
• self-organization, vertical integration and the foundation of an Advanced-Research Tech-
standardization of production “islands” on nological Platform for Logistics Applications’
ERP level, Networks (ARTPLAN) platform shall be defined
• centrally optimized planning and docu- based on:
mentation of the production process for
JIT/JIS production, • reference architectures and components
• product tracing for quality control and de- • methods and tools,
commissioning, as well as • communication interfaces, and
• modularization and networking through • standards.
mobile communication technology, wired
and wireless on- demand connections (e.g. In order to achieve this goal, best practices and
Industrial Ethernet). sound architectures shall be collected and explored
for JIT/JIS logistics processes optimization using
outlooK ICT technology. Key components shall be identi-
fied and their standard properties assembled and
Corresponding with our efforts on defining a joined in a knowledge-base. The methods and
common technological platform for logistics tools will be collected from logistics applications
applications and networks mainly the goals and and will build the technological platform’s logic.
means with their impact on QoS needed to be Key communication interfaces and appropriate
explored for every application area. In particular, technologies will be identified and assembled in
the methods and devices used depending on the the mentioned base of knowledge. And finally,
application area, and the information flow and data standards will be explored, to assure QoS on one
security issues according to application area were hand and provide for interoperability of networked
emphasized, since they represent the key areas components, systems and plants on the other.
where ICT technology comes into play. As in the case of ARTEMIS, the platform should
Since the primary focus of this contribution build on best practices from the industry and sound
remains on the ICT technological support for the research from the academia, hence joining the
individual application areas, key technologies are two in logistics applications’ networks research.
identified as well as methods and standards sup- The industry shall provide standard components,
porting improved QoS in these key areas are stated technology standards and best practices, while the
and their interrelations further explored. Here academia shall provide methods for supply chain
especially modern mobile computing and com- optimization and research on new methods, tools
munication devices are expected to be the driving as well as solutions for interoperability among
technologies of future logistics applications. On components, systems and plants.
the other hand, for improved planning, the logis-
tics operations and sites are being considered in a
modular fashion by their containerization. Besides
155
Information and Communication Technology in Logistics as a Comparative Advantage
Artemis (2008). European Technology Platform, ZVEI - Institut für Zukunftsstudien und Technolo-
Embedded Intelligence and Systems, Retrieved giebewertung. (2007). Integrierte Technologie-
fromhttp://www.artemis.eu/ Roadmap. Retrieved from http://www.ttn-hessen.
de/npkpublish/filestore/77/zvei.pdf
Ballou, R. H. (2004). Business Logistics/Supply
Chain Management – Planning, Organizing, and
Controlling the Supply Chain.Upper Saddle River,
New Jersey: Prentice Hall. endnote
156
157
Chapter 9
How to Market OR/
MS Decision Support
Masayuki Ueda
Sapporo University, Japan
aBStract
This research examines what to do to have decision makers more utilize OR/MS decision support. We
investigate OR/MS decision support from a new viewpoint of service. Firstly, based on the fact that
what is provided by OR/MS decision support is information to aid in decision making, we show that OR/
MS decision support shares characteristics with service, hence can be considered as a kind of service.
Next, we analyze OR/MS decision support from the viewpoint of what is necessary for service of high
quality, and we clarify the issue of communication gaps. If we investigate preceding research in OR/
MS (Operations Research/Management Science), it turns out that there is surely a problem with com-
munication gap between decision makers and decision supporters. Finally, we show that it is effective
to utilize problem specification, which is a decision-maker-friendly description of problems proposed by
research groups including the author, as one approach to bridge the communication gap.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
How to Market OR/MS Decision Support
158
How to Market OR/MS Decision Support
MS depends on whether we judge most customers service is activity where production by service-
as having a high level of OR/MS knowledge or providers and consumption by users are done inter-
not. Murphy (2005) pointed out that “the main actively and concurrently. That is, service is over
unsolved issue for OR practitioners is developing if the activity is concluded. Heterogeneity implies
ways of communicating and marketing solution that the value of service cannot be determined in
that is intangible to managers [i.e. prospective itself, but it depends on the user’s mental state and
customers] when most managers do not understand environment. That is, service is offered to users
the mathematics involved” (p.155). who might have different demands and values
For the problem mentioned above, this research from that of service-providers (or what service-
examines what to do to have decision makers more providers provide). Therefore, the adjustment of
utilize OR/MS decision support from a viewpoint the views between service-providers and users, or
of service. in other words, communication is indispensable.
The value of service must be improved by interac-
tion between service-providers and users.
or/mS decISIon SuPPort
IS a ServIce or/mS decision Support
159
How to Market OR/MS Decision Support
OR/MS knowledge, especially mathematical skillful manner. That is, a mathematical model is
knowledge that is required in OR/MS, wide com- not a faithful description of a decision problem.
munication gaps do not occur because they can It becomes difficult for decision makers to judge
perform most steps alone or they can understand the quality of the provided information since they
what is carried out through the whole process. need to judge whether the process of simplifica-
However, it is something else whether decision tion and abstraction are appropriate.
makers actually choose to independently perform A purpose of OR/MS decision support is not
the concerned problem-solving process. It will be to derive a solution of a mathematical model,
judged depending on their roles in the manage- but to provide information that contributes to
ment. On the other hand, if decision makers have the problem-solving process of decision makers.
insufficient OR/MS knowledge, communication Under such purpose, interaction or exchange of
between decision makers and decision support- information between decision makers and deci-
ers becomes difficult because the steps in which sion supporters becomes essential to conduct
decision makers can participate independently and Step1 and Step4. That is, the decision maker’s
autonomously are limited (discussed later). Here use of decision support and supporting activity
we assume that decision makers have insufficient by decision supporters must be performed simul-
OR/MS knowledge unless otherwise stated. taneously. This corresponds with simultaneity
of service.
What is Provided by or/ OR/MS decision support is performed through
mS decision Support information acquired in Step2 and Step3. The
value of the decision support is recognized only
OR/MS decision support provides information when decision makers predict the effect of the
that contributes to the problem-solving process information in the real world. No matter how
of decision makers through the aforementioned mathematically sound information that decision
process. That is, what is provided by OR/MS supporters provide is, the value of the information
decision support cannot be handled physically. cannot be recognized when decision makers judge
This characteristic corresponds with intangibil- that it is unsuitable for implementation. In other
ity of service. words, the value of OR/MS decision support is
The information provided by OR/MS decision evaluated depending not only on the information
support is obtained from analyzing a mathemati- itself that decision supporters provide, but also
cal model. Good mathematical models are often on the situation of decision makers who examine
characterized as those that simplify the decision the administration of the information. This cor-
problem and express its essential structure in a responds with heterogeneity of service.
160
How to Market OR/MS Decision Support
The above-mentioned analysis shows that OR/ service delivery. In services classified as services
MS decision support has three characteristics of directed at goods and other physical possessions,
service: intangibility, simultaneity, and heteroge- there are service where the users need to be
neity. From this discussion, we theoretically con- present only when initiating and terminating the
clude that OR/MS decision support is a service. service. There are also service where the users do
not necessarily have to be physically present by
utilizing information technology: such as services
analyzIng or/mS decISIon directed at people’s minds or services directed at
SuPPort aS a ServIce intangible assets.
In OR/MS decision support, the data that de-
mental Intangibility scribes the problem situation of decision makers is
processed through an intangible action. Therefore,
Figure 2 is one of the schemes for classifying if we follow the taxonomy of Lovelock (1983),
service proposed by Lovelock (1983). Service are OR/MS decision support is classified as services
divided into an upper and a lower half depending directed at intangible assets. As referred to here-
on whether the nature of the service act is tangible inafter, when decision makers have insufficient
or intangible. Service are also divided into a left mathematical knowledge, the steps in which
and a right half depending on whether the direct decision makers can independently and autono-
recipient of the service act is people or things. By mously participate are limited. In OR/MS deci-
these questions, service can be classified into four sion support, decision makers do not necessarily
broad categories: (1) services directed at people’s have to be physically present throughout service
bodies, (2) services directed at goods and other delivery. Lovelock (1983) pointed out that in the
physical possessions, (3) services directed at case where the users can get the service even if
people’s minds, (4) services directed at intangible they do not enter the service factory (i.e. a physical
assets. In services directed at people’s bodies, the place where service operation is performed), “the
users need to be physically present throughout outcome of the service act remains very important,
Figure 2. The scheme for classifying service (Adapted from Lovelock, 1983, p.12)
161
How to Market OR/MS Decision Support
but the process of service delivery may be of little do not fully understand the relation between their
interest” (p.13). However, this does not apply to problems and the mathematical models. In the
the case of OR/MS decision support. situation where it is difficult for decision makers
Intangibility is composed of two dimensions: to understand the mathematical models used for
physical intangibility and mental intangibility producing the provided information, it becomes
(Laroche, McDougall, Bergeron, & Yang, 2004; important to enable decision makers to be con-
McDougall & Snetsinger, 1990). Physical intan- vinced that their problem is solved through the
gibility implies that what is provided cannot be whole process so that they can enjoy the benefit
touched physically. Mental intangibility implies of OR/MS decision support. In Parasuraman,
that one cannot evaluate what is provided if one Zeithaml, & Berry (1985), communication is cited
lacks the experience (or knowledge) with it. In as one of the determinants of service quality. This
the case of OR/MS decision support, which is communication involves assuring the customer
the activity using mathematical techniques, it is that a problem will be handled properly. From
necessary to recognize not only merely that what this, “decision makers are mentally present” can be
is provided is information (i.e. physical intangibil- understood that decision makers can be convinced
ity), but also that decision makers having insuf- that a mathematical model analyzed properly
ficient mathematical knowledge cannot appreciate expresses their problem; in other words, that a
what is provided (i.e. mental intangibility). Given problem is shared between decision makers and
this perspective, we can realize that, though OR/ decision supporters through the whole process.
MS decision support is classified as services di- In the following, we investigate the issue of
rected at intangible assets, it is also necessary to communication gap that is linked to the sharing
analyze it from the dimension of services directed of a problem between decision makers and deci-
at people’s minds (Figure 2). Lovelock (1994) sion supporters.
pointed out that (even when the users do not
necessarily have to be physically present) unless necessity of Improving
the users are mentally present, they cannot enjoy communication gap
the benefit of the service in services directed at
people’s minds 1. What OR/MS decision support provides is in-
Then what does that users are mentally present formation to aid in decision making. For such
mean in the context of OR/MS decision support? information to be made use of by decision makers,
Walker (2000) pointed out that one of the major sufficient understanding of the process through
reasons why the results of policy analysis (i.e. which the information is produced is necessary.
information to aid in decision making) do not get So, participation of decision makers in the process
used is that the policymakers (i.e. decision makers) becomes important.
do not understand how the results are obtained. However, when decision makers have insuf-
This implies that, in OR/MS decision support, it is ficient mathematical knowledge, the steps in
necessary for decision makers to understand how which decision makers can independently and
the provided information is produced (e.g. how autonomously participate are limited: the step to
a problem is formulated or how a mathematical formulate the problem of their own (Step1) and the
model is constructed) so that the information is step to evaluate the feasibility and effectiveness of
made use of by them (Figure 1). However, as the solution provided by decision supporters in the
referred to hereinafter, some preceding research real world (a part of Step4). When the steps that
point out that decision makers do not understand decision makers can participate in are limited as
the mathematical models or that decision makers mentioned above, it is difficult for them to judge
162
How to Market OR/MS Decision Support
163
How to Market OR/MS Decision Support
What can be said from their research is that communication to confirm that a problem is shared
the reason why OR/MS models tend not to be between decision makers and decision supporters
widely used does not always lie in the information through the whole process.
itself produced from these models. A real reason As mentioned above, if we investigate preced-
might be that decision makers cannot appreciate ing research in OR/MS, it turns out that there is
the information produced from OR/MS models surely a problem with communication gap between
because they do not understand OR/MS models. decision makers and decision supporters.
Furthermore, it is pointed out that cases frequently
occur where OR techniques tend not to be used
for the reasons that are not directly related to ImProvement of the
the validity of solutions (Yamada, 1984). This is communIcatIon gaP
recognized as the background of the OR imple-
mentation problem. existing methods for Improvement
The discussions above make clear that in
order to realize more effective OR/MS decision The left of Figure 3 illustrates the situation of
support, it is important not only to construct a OR/MS decision support pointed out by preced-
better mathematical model and develop a more ing research. For decision makers, it is difficult
efficient solution, but also to examine how to to judge whether a mathematical model, which
provide information through the whole process so is analyzed to produce the provided information,
that decision makers can appreciate the provided properly expresses their problem. This situation is
information. Banerjee & Basu (1993) insisted that expressed with arrows of dotted lines connecting
“in order to use model based DSS [i.e. OR/MS decision problems and mathematical models in
decision support] effectively in a decision mak- the figure. On the other hand, as Ackoff (1974)
ing paradigm we need to get the decision makers pointed out that “we fail more often because we
involved in different problem solving phases” solve the wrong problem than because we get the
(p.76). However, as mentioned previously, when wrong solution to the right problem” (p.8), it is
decision makers have insufficient mathematical difficult for decision supporters to precisely grasp
knowledge, the steps in which decision makers decision maker’s problems (This may also apply
can independently and autonomously participate to decision makers). This situation is expressed
are limited. From this, it can be understood that with ellipses of dotted lines that surround decision
Banerjee & Basu (1993) asserted the necessity of problems in the figure.
164
How to Market OR/MS Decision Support
Miyazaki (1990) examined interactive OR tions into the real world situations. Therefore, it
from the standpoint of SSM (Soft Systems Meth- cannot be said that improvement of the commu-
odology). Miyazaki (1990) pointed out that one nication gap between decision makers and deci-
purpose of interactive OR is, through model-based sion supporters with these problem description
interaction, to promote improvement of the model, methods is large.
understanding of the target system, and consensus-
building between participants in an integrated Problem Specification approach
way. This accords with SSM where a conceptual
model and interaction are regarded to be important The author of this paper suggested another method
as a method of the mutual understanding between elsewhere. The method is one that utilizes a
participants. However, if we apply this in case of problem specification (See the right of Figure
OR/MS decision support, we need to facilitate 3). Problem specification is a description of a
interaction based on mathematical models. It is problem by the vernacular of decision makers in
required for participants (i.e. decision makers) to the real world 2. More specifically, the proposal
have sufficient mathematical knowledge so that is that by preparing a description of a real world
such interaction can be effectively performed. problem to be modeled into a mathematical model,
This situation does not change basically even if the burden to judge whether a problem is shared
we introduce high operability and various graphic between decision makers and decision supporters
expression of model by utilization of information might be reduced.
technology that is one of the characteristics of Preparation of a problem specification is
interactive OR. That is, as far as mathematical carried out independently with construction of a
model-mediated communication is concerned, mathematical model. That is, a decision problem
it is insufficient to bridge the communication is described as recognized by decision makers. In
gap between decision makers and decision sup- the case of problem specification, unlike math-
porters. ematical model, judgment on simplification and
Another method proposed for bridging the abstraction is not concerned. Decision supporters
communication gap between decision makers may communicate with decision makers naturally
and decision supporters are to use Structured about mathematical modeling in mind, and help
Modeling Language (SML, hereafter) suggested decision makers to articulate their problems.
by Geoffrion (1987) and Entity-Relationship with However, they must do it by the vernacular of
Linear Mathematical Programming (ERLMP, decision makers. So, problem specification is
hereafter) suggested by Choobineh (1991). SML convenient to communicate between decision
and ERLMP are examples of problem description makers and decision supporters about what kind
methods. One of their purposes is to increase of problem is to be modeled into a mathematical
the understandability of mathematical models. model and what kind of problem the concerned
However, information described by them is mathematical model describes.
substantively limited. They explain clearly what Decision makers and decision supporters share
kind of problem the concerned mathematical a problem specification as decision maker’s prob-
model describes. However, they do not directly lem. Decision supporters guarantee that a math-
describe the problem in the real world modeled ematical model properly expresses the problem
into a mathematical model. When decision mak- specification shared. Thus, when decision makers
ers judge whether the concerned mathematical place credence in decision supporters, decision
model properly expresses their problem, they are makers can be sure that the concerned mathemati-
requested to translate these mathematical descrip- cal model properly expresses their problem.
165
How to Market OR/MS Decision Support
Miyazaki (1990) pointed out two problems Sekiguchi (2002), Mukohara, Sekiguchi, & Bao
that have principal influence on problem solving (2005). GERM is a method to describe decision
in the modeling process. One is the problem with problems in the real world with the style of an
regard to understanding and agreement of the extended Entity-Relationship Model. GERM
problem situation: how one understands a decision problem specification consists of description of
problem. The other is the problem with regard object types and their relationships that constitute
to precision of a model: whether the understood world of discourse. An object type is a set of
problem is properly expressed as a mathematical similar objects. Object type is described by a set
model. Problem specification is a description of of attributes and their values. GERM describes
what decision supporters, who are builders of a qualitative attributes as well as quantitative attri-
mathematical model, shared with decision mak- butes. Most of the qualitative attributes concern
ers regarding the problem situation in terms or structure of mathematical model, and they are
vocabulary that decision makers can understand not explicitly described by the existing problem
autonomously. So, it corresponds to the former description methods such as SML and ERLMP.
problem. That a problem specification properly Figure 4 presents object types and their relation-
expresses decision maker’s problem must be ships appearing in a GERM problem specification
guaranteed on the decision maker’s responsibility. of a scheduling problem (that are used in the case
This situation is expressed with arrows connecting illustrated in the next section) 3. Double squares
decision problems and problem specifications in are object types and double diamonds are relation-
the figure 3. On the other hand, that a mathemati- ships. Three relationships at the rightmost position
cal model properly expresses this shared problem are relationships of two operations (but lines to
must be guaranteed on the decision supporter’s show the second operation are omitted). Instantia-
responsibility. This situation is expressed with tion (i.e., determining values of all attributes) of a
arrows connecting problem specifications and GERM problem specification generates a problem
mathematical models in the figure 3. type. A problem type is what is described by exist-
Even if we introduce problem specification, ing problem description methods, and instantia-
the steps in which decision makers can participate tion (i.e., determining value of all attributes for
independently and autonomously through the all related objects) of a problem type generates a
whole process are unchanged. However, by shar- numerical instance of a problem type 4.
ing problem specification, decision makers can Mentioned above, GERM regards, as things to
be convinced that their problem is solved through be described, object types and their relationships
the whole process. That is, decision makers can be that are natural objects of recognition in the real
mentally present during OR/MS decision support world. Because GERM problem specification
process. If decision supporters try to improve the describes qualitative attributes, it can describe a
information provided to decision makers, deci- wide range of information about decision maker’s
sion supporters must not perform it only in the problems in the real world. Therefore, GERM
mathematical world. Decision supporters firstly problem specification would enable decision
need to change the problem specification in the makers to recognize how decision supporters
real world (shared with decision makers), and understand decision maker’s problem more easily
then let the result appropriately reflected in the than the existing problem description methods
mathematical world. do. This will help to bridge the communication
As for a method of problem specification, the gap between decision makers and decision sup-
author adopts Generic Entity-Relationship Model porters.
(GERM, hereafter) proposed by Mukohara &
166
How to Market OR/MS Decision Support
167
How to Market OR/MS Decision Support
in describing scheduling problem types of both The above procedure was applied to the
users and problem description rules of APS soft- ABC plant. Both decision supporter (the author
ware. Effectiveness of the proposed procedure of this paper) and decision makers agreed that
was verified by applying it to an actual machin- the obtained GERM problem specification of
ing plant (ABC plant, hereafter). The procedure scheduling problems in the ABC plant precisely
is the following. describes their scheduling problems. The selected
APS software actually generated a satisfactory
1. Prepare GERM problem specification to schedule to a set of data collected from the plant.
each APS software that seems fit to the The procedure performed by only four meetings
target plant. This step is done by organizing of two hour long, which is far short compared
problem description rules as object types, to average cases of conventional APS software
their attributes and attribute values. selection (according to an expert consultant of
2. Prepare GERM problem specification to the APS software deployment).
problem type of scheduling problems that From above-mentioned experiment, we con-
can emerge in the target plant. For doing firmed (1) that by preparing problem specification,
this, interview managers and workers of a problem is shared between decision makers and
the target plant and identify object types, decision supporters, and (2) that decision makers
their attributes and possible attribute values. become able to check the appropriateness of the
Because it is often the case that the plant selected APS software by receiving an explanation
workers/engineers know their scheduling of the process where the problem specifications
problem well, but have never articulated it were compared. From this, we found that it is ef-
in a rigorous form that can be read by others, fective to use problem specifications for bridging
decision supporters must explain how each the communication gap between decision makers
objects and relationships in the target plant and decision supporters.
can be described by utilizing terminology
used in GERM problem specification of
APS software. Moreover, ask the customers concluSIon
if there are phenomena or properties in their
plant that are observed but not described by In this research, we examine what to do to have
the explained terminology. decision makers more utilize OR/MS decision
3. Compare the GERM problem specification support from a viewpoint of service. We analyze
developed in step (2) to each one developed OR/MS decision support not from the viewpoint
in step (1), and identify APS software whose of what kind of information is offered (i.e. techni-
GERM problem specification contains all cal quality), but from the viewpoint of how the
object types, all attributes of each object information is offered to decision makers (i.e.
type, and all attribute values of each attribute functional quality).
included in the GERM problem specification What is provided by OR/MS decision support
of the target plant. If there is one or more is information that contributes to the problem-
such APS software, anyone of them is fea- solving process of decision makers (i.e. intangibil-
sible choice. If none, none of the candidate ity). Intangibility is composed of two dimensions:
APS software is adequate to the plant as it physical intangibility and mental intangibility.
is. In the case of OR/MS decision support, which is
the activity using mathematical techniques, it is
168
How to Market OR/MS Decision Support
169
How to Market OR/MS Decision Support
Kameoka, A. (2006). Saabisu, seihin, gijyutu Morimoto, N., & Sawatani, Y. (2005, November).
inobesyon wo yuugou, sousyutu, hukan suru tou- Saabisu saiensu no kanousei [The Potential of
gougata senryaku roodo mappingu [An integrated Service Science]. Diamond Harvard Business
strategic road mapping that fuses, creates and Review, 109-124.
surveys service, product and technical]. Opera-
Mukohara, T., & Sekiguchi, Y. (2002). The DSS
tions research as a management science research,
architecture based on problems specification and
51(9), 573-578.
model/solver independence. In E. Kozan, & A.
Laroche, M., McDougall, G. H. G., Bergeron, J., & Ohuch (Ed.), Operations Research/Management
Yang, Z. (2004). Exploring How Intangibility Af- Science at work: Applying Theory in the Area
fects Perceived Risk. Journal of Service Research, Pacific Region (pp.281-298). The Netherlands:
6(4), 373–389. doi:10.1177/1094670503262955 Kluwer Academic Publishers.
Levasseur, R. E. (2007). People Skill: Marketing Mukohara, T., Sekiguchi, Y., & Bao, J. (2005).
OR/MS - A People Problem. Interfaces, 37(4), Jittai-kanren gainen no kakutyou niyoru suke-
383–384. doi:10.1287/inte.1060.0254 jyuuring mondai kijyutu no tokutyou to ouyou
[Scheduling Problems Specification by Extending
Little, J. D. C. (2004). Model and Managers: The
Entity-Relationship Concept: Characteristics and
Concept of a Decision Calculus. Management
Applications]. Transactions of the Operations
Science, 50(12), 1841-1853 (a reprint of a paper
Research Society of Japan, 48, 66–84.
originally published in Management Science,
1970, 16(8), 75-89). Murphy, F. H. (2005). ASP, The Art and Science
of Practice; Elements of a Theory of the Practice
Lovelock, C. H. (1983). Classifying Services to
of Operations Research: A Framework. Interfaces,
Gain Strategic Marketing Insights. Journal of
35(2), 154–163. doi:10.1287/inte.1050.0126
Marketing, 47(3), 9–20. doi:10.2307/1251193
Parasuraman, P., Zeithaml, V. A., & Berry, L. L.
Lovelock, C. H. (1994). Product Plus: How Prod-
(1985). A Conceptual Model of Service Quality and
uct + Service = Competitive Advantage. New
Its Implications for Future Research. Journal of
York: McGraw-Hill.
Marketing, 49(4), 41–50. doi:10.2307/1251430
McDougall, G. H. G., & Snetsinger, D. W.
Ueda, M., & Sekiguchi, Y. (2005). Mondaiteigi
(1990). The Intangibility of Services: Measure-
wo katuyou suru APS sofutouea sentaku tejyun
ment and Competitive Perspectives. Journal of
no yuukousei nikansuru kenkyuu [Effective-
Services Marketing, 4(4), 27–40. doi:10.1108/
ness of a Procedure for ASP Software Selection
EUM0000000002523
Based on Problem Specification]. Journal of
Miyazaki, M. (1990). Atarasii sisutemuzu the Japan Society for Production Management,
apuroochi to taiwagata OR: taiwagata OR no 11(2), 57–66.
houhouronteki haikei wo nagamete [New Sys-
Walker, W. E. (2000). Policy Analysis: A Sys-
tems Approach and Interactive OR: Looking at
tematic Approach to Supporting Policymaking in
methodological background of interactive OR].
the Public Sector. Journal of Multi-criteria Deci-
Operations research as a management science
sion Analysis, 9(1-3), 11–27. doi:10.1002/1099-
research, 35(8), 454-456.
1360(200001/05)9:1/3<11::AID-
MCDA264>3.0.CO;2-3
170
How to Market OR/MS Decision Support
Yamada, Y. (1984). Manegiment sisutemu to OR: problem specification and make a distinction
tokushuu ni attate [Management system and OR: between problem specification and problem
In planning for this special topic]. Operations description method.
research as a management science research, 3
A figure like Figure 4 is often used to make
29(11), 632. it easy to understand the interrelationship
among object types (or objects). However, it
is not an essential element in GERM problem
specification. Refer to Ueda & Sekiguchi
endnoteS
(2005) for what Figure 4 implies and the
1
Lovelock (1994) cited that “sleeping in class content of GERM problem specification
will not normally leave students much wiser corresponding to this figure.
at the end than they were at the beginning”
4
Refer to Mukohara & Sekiguchi (2002), Mu-
(p.14) as an explanation for addressing if kohara, Sekiguchi, & Bao (2005) for more
users are mentally present or not. details on GERM problem specification.
2
There are several bodies of preceding re-
5
APS (Advanced Planning and Scheduling)
search that propose methods for describing software, such as Scheduling Komei (Toyo
problems to be modeled into mathematical Engineering Corp.), ASPROVA (Asprova
models (i.e. problem description method). Corp.), and Joy Scheduler (JT Engineering
However, the information described by the Inc.), is one for dealing with production
proposed methods is limited to explana- planning and scheduling problems in an
tion of the concerned mathematical model. integrated way.
Therefore, in this research, we use a term
171
Section 4
Service Sourcing and Supplier
Management
173
Chapter 10
A Multicriteria Tool for
Evaluating Performance
of Service Suppliers:
The Case of Met-Mex
Peñoles Supply Chain
Albalicia Martínez Hernández
Universidad Tecnológica de Torreón, Mexico
aBStract
The purpose of this document is to expose an applied methodology for improving performance of service
supply chains mainly focusing on performance of service suppliers running operations in emerging
market context. In fact, this solution (methodology and informatics tool) was conceived as a standard-
ized instrument for suppliers of the metallurgical sector. Whereas some researches analyze the service
supplier selection, the originality of this work is its continuous improvement approach, based on a
standard instrument to measure and improve the quality of service in a metallurgical supply chain.
From a logistics standpoint, this applied approach was helpful to the practitioners who were faced
with complex evaluating supplier tasks. Comparing with other approaches, the main advantages of the
solution proposed is its hybrid methodology founded on a strong systemic point of view and, continuous
improvement purpose, as well as its easiness of utilization by service suppliers themselves.
DOI: 10.4018/978-1-61520-603-2.ch010
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
A Multicriteria Tool for Evaluating Performance of Service Suppliers
174
A Multicriteria Tool for Evaluating Performance of Service Suppliers
performance more than a supplier selection tool. in service delivery. Section four discusses the
The main advantages of the proposed method proposed methodology and the informatics tool
is its easiness of utilization by service suppli- developed for its implementation. Finally, some
ers themselves, and reliability founded on well conclusions about the process and future work
established tools as SWOT (Strengths, Weak- are exposed.
nesses, Opportunities, and Threats), moments
of the truth, SERVQUAL, and AHP (Analytic
Hierarchy Process). BacKground
After an important literature review it was
visible that, as Seth et al. (2006a) argue, “The Met Mex Peñoles is a mining group founded
buyer-supplier relationship and management is in 1887 with integrated operations in smelting
a well-explored area but fewer studies are seen and refining non-ferrous metals, and producing
on the applicability of service quality concepts chemicals. Called just “Peñoles”, it is the world’s
on the supplier side”. At the same time, even if top producer of refined silver, metallic bismuth
there are many information about dimensions and sodium sulfate. It is also the leading Latin
of service quality, “there is no universal set of American producer of refined gold, lead and zinc.
dimensions for measurement of service quality” Currently, it is one of the largest net exporters
(Seth et al., 2006b). At the same time, because in Mexico’s private sector. The company has 12
in emerging markets there are substantially more production sites and is organized around four divi-
operational risks due to factors like market and sions: 1) Exploration, engineering and construc-
financial volatility; quality fade; supply disrup- tion Division; 2) Mining; 3) Metals-Chemicals;
tions; infrastructural challenges; lack of transpar- 4) Infrastructure.
ency and performance measurement problems; ad The exploration, engineering and construc-
hoc solutions taking into account the impact of tion division is engaged in locating, studying,
external environment factors on quality of service analyzing and developing valuable deposits of
and easy to implement by all members of supply non-ferrous metals in Mexico and Latin America,
chain have to be found. In fact, when in a research in order to build up the Group’s current reserves.
context where there is complexity and lack of This division is also responsible for developing
well-supported definitions and metrics a case engineering projects and construction for the
study approach is favored (Yin, 1989; Stuart et al. Group’s operating divisions.
2002). Thus, this research was developed based The mining division is focused on the ex-
on the particular case of the Met-Mex Peñoles ploration of minerals with metallic contents of
the methodological design and implementation gold, silver, lead, zinc and copper, to produce
through a software tool has shown their high lead, zinc and copper concentrates, gold-silver
relevance. This analysis provides a method of precipitates, and doré. It operates the world’s
performance evaluation in three stages. richest underground silver mine (Fresnillo), the
In the balance of this document, the next sec- richest underground gold mine (La Ciénega), the
tion shows the background to the study, showing largest open-cut gold mine (La Herradura) and
the characteristics of service suppliers and context the largest under ground zinc mine (Francisco I.
of operation where the implementation was car- Madero) in Mexico.
ried out. Section three exposes a literature review The Metals-Chemicals division operates two
seeking to both the particularities of performance businesses: Metals and Chemicals. The Metals
measurement of service suppliers, and aspects business operates the largest non-ferrous metal-
of the measurement of the concept of quality lurgical complex (Met-Mex Peñoles) in Latin
175
A Multicriteria Tool for Evaluating Performance of Service Suppliers
America, and the fourth largest in the world in b. External suppliers: These are individuals
terms of production value. Its facilities include a or corporations who do not belong to the
lead foundry, a lead-silver refinery and an elec- organization and provide a tangible good
trolytic zinc refinery; it also operates plants that or an intangible asset.
make sulfuric acid, cadmium, bismuth, ammonium
sulfate, and liquid sulfur dioxide. The Chemicals In its relationship with the company, a supplier
business is engaged in the production and sale of goes at least through two steps: the entry and stay
sodium sulfate, magnesium oxide, magnesium in the supply chain. At the stage of admission, the
sulfate, and ammonium sulfate (fertilizer). It has supplier is selected from a group of other vendors
the largest sodium sulfate plant (Química del who do the kind of work required by the company.
Rey) in the world. On the other hand, once the supplier has been
The infrastructure division is focused on selected, before the continuous improvement ap-
seeking and managing projects to guarantee the proach is implemented, the organization assesses
supply and control the costs of the logistical and its performance so as to determine its permanence
electrical energy needs of Peñoles. It also seeks within their supply chain.
out opportunities that can contribute to growth and In the company, the evaluation occurs in two
diversification of the company in keeping with ways to suppliers of tangible assets: 1) evaluating
its overall vision. It has an international marine the quality of the product, 2) evaluation of service
terminal (Termimar) for shipping chemical prod- delivery that is involved. For service suppliers,
ucts in bulk, a railway line (Coahuila-Durango) the evaluation is performed only in the percep-
for carrying raw materials and finished products, tion of quality service. Assessing the quality of
two companies (TECSA and IACMEX) engaged the product is relatively simple, because it is
in the administration of municipal drinking water tangible to measure weight, height, thickness, etc.
service in Mexico City, an integral concession However, to evaluate a service, the task is more
(Desarrollos Hidráulicos de Cancún) that manages complex because the main feature of the service
and cleans water in the municipalities of Cancun is perception.
and Isla Mujeres and is responsible for assigning In the latter case, it should also be noted that
energy from the company’s thermoelectric plant any service is intangible, heterogeneous and mo-
(Termoeléctrica Peñoles) to group operations. mentary. It is intangible because the service cannot
be measured, weigh, and so on. It is heterogeneous
Service Suppliers in the met since the services provided by different vendors
mex Peñoles Supply chain are different, and momentary as the customer-
supplier interaction in the process of service
Service suppliers, as a central element of the supply (hereinafter such interaction will be referred to
chain, are no longer viewed as isolated entities. as servuction1) is given in a short period of time
The current trend is to create customer-supplier (Fernández, 1996).
alliances in order to generate mutual benefits in
terms of time and cost. In Met Mex Peñoles there development of Service Suppliers
are two types of suppliers: and maintenance System
a. Internal suppliers: they are staff within the For the development of applied research, the
organization that provide either tangible study was developed in four plants of Met Mex
property (which leads to offer a service) or Peñoles: 1) Zinc 2) Foundry, 3) Refinery and 4)
an intangible asset (service). Unit Bermejillo. The company requires three types
176
A Multicriteria Tool for Evaluating Performance of Service Suppliers
177
A Multicriteria Tool for Evaluating Performance of Service Suppliers
178
A Multicriteria Tool for Evaluating Performance of Service Suppliers
especially the term of quantity, because the supplier into account that one of the main service
must meet a number of pieces to deliver. characteristics is perception, contributing
to a supplier classification in which three
c. Opportunities: to define a tool that helps aspects are possible to distinguish: accepted
evaluate the supplier performance, taking (which means that the offered services go
Table 1. Summary of strengths and weaknesses of the system development and maintenance of suppli-
ers
179
A Multicriteria Tool for Evaluating Performance of Service Suppliers
180
A Multicriteria Tool for Evaluating Performance of Service Suppliers
representative and the customer’s expectations of tionship, the customers involved in the transaction
behavior that create the process of service. “ service are identified with the aim of researching
Under this scheme, two moments are defined: “moments” experienced in servuction (stellar or bit-
a) Stellar (when according to the customer, the ter) on the field. As a result, it is possible to define
service met his expectations); b) Bitter (otherwise). strategies on the one hand to support and enhance
It should be noted that the moments of truth may the great moments and on the other hand, the search
also result from interaction with the infrastructure for improvements to the bitter moments.
(anywhere the service cycle is carried out).
For the identification of the moments of the ServQual (Service Quality)
servuction, it is important to understand the factors
involved in the service and which are the bases for One of the models representing the real level
the identification of processes are. Karl Albrecht of quality achieved in an organization from the
(1984) presents a triangle of the service, which standpoint of their clients is that of Parasuraman,
shows those factors: a) staff, which provides Zeithaml and Berry (Ruiz, 2001, Cronin, J. J. and
customer service oriented, b) systems, i.e. how to Taylor, S., 1992, 1999), through a questionnaire.
process the service organization; c) strategies to According to Heung et al. (2000) SERVQUAL is a
effectively enable the system to satisfy customer simple, inexpensive, and easy model to implement
expectations. Having identified the factors of the that considers two factors in providing a service: a)
service, another important concept was the service the expectation, a customer creates an expectation
cycle, which is the sequence of activities in stages which is given as a service, b) the perception, when
that allow observing servuction, and it is where after the service; the customer gets a perception and
the moments of truth are strongly identified. then makes a distinction between what is expected
Defining the service cycle is a principle of to eventually obtain.
the establishment of the moments of truth, as it As the numeric indicator shows:
has been said; they represent the bitter or stellar
situations trough which the customer goes dur- SERVQUAL = ∑ (Pi − Ei ) (1)
ing the service. The advantages of structuring
the moments of truth are classified as follows
(Albrecht, 1984): Where:
181
A Multicriteria Tool for Evaluating Performance of Service Suppliers
(See figure 1). Although a number of critiques on • Gap 6: Is the difference between expected
a range of issues of SERVQUAL, it is one of the and perceived performance, identifying
most accepted tools in the field of service quality with this the level of quality achieved.
(Seth et al., 2005). In fact, most of the studies in
the service quality area are based on the work of Another important aspect of the model is the
Parasuraman et al. (1985, 1988). establishment of attributes called dimensions,
It can be seen, there are “gaps” in the model, which must develop and maintain any organiza-
which are defined as discrepancies between tion focused on service, which deal with general
expectation and perception. These discrepancies aspects that must be evaluated in a service and
are attributed to the clients or the organizations are summarized in five:
providing services. The “gaps” are defined as
follows: 1. Tangible elements: it refers to the physical
appearance of facilities, equipment, personal
• Gap1: Indicates the discrepancy between and communication materials.
customer expectations on service and the 2. Reliability: it indicates the ability of the
perceptions that managers have about what organization to run the service promised in
the consumer of that service must expect. a reliable and careful way.
• Gap 2: Is the difference between the per- 3. Response capacity: it refers to the willingness
ceptions of managers and specifications or to assist clients to provide prompt service.
quality standards. 4. Safety: it is the knowledge and care shown
• Gap 3: Is the difference between the speci- by staff and ability to inspire confidence and
fications or standards of service quality and credibility.
delivery of it. 5. Empathy: individualized attention offered by
• Gap 4: Is the discrepancy between service companies to their customers. The imple-
delivery and external communication. mentation of the dimensions of service is
• Gap 5: Is the discrepancy between service general, i.e., any service can be assessed.
delivery and perceived performance.
182
A Multicriteria Tool for Evaluating Performance of Service Suppliers
183
A Multicriteria Tool for Evaluating Performance of Service Suppliers
With such an assessment a matrix An×n is suppliers in the metallurgical sector in Mexico
constructed, where a ij is the comparison between to continuously improve its performance was
the j item and the i item. And it must meet certain identified. The methodology has three stages:
characteristics. The aim is to find the eigenvec- a) Definition a set of indicators, concepts and
tor showing the weights of the ratings given to dimensions to provide quality service through
the alternatives and criteria so that the method is the tool moments of truth, in combination with
based on the principles of principal components, the dimensions SERVQUAL (defined as the base
thus helping to classify the performance of service platform), b) Analyze of the relevance of methods
suppliers. such as multi-criteria decision support tools for
Even if there are other existing multi-criteria measurement, c) Development of an informatics
techniques that can be used, AHP is proposed as tool as support for continuous improving process
a suitable technique because it may be helpful to of services suppliers (see Figure 2).
practitioners who are faced with processes where
service suppliers are involved. using the moments of truth
184
A Multicriteria Tool for Evaluating Performance of Service Suppliers
The review of the process diagrams identify 1. Client: delivers work order or request from
two processes in which customers interact with the domestic supplier for the recruitment of
service suppliers: a) work orders, b) service re- the outside vendor providing the service.
quests. Note that each process has its own internal The client maintains feedback during the
policies established by the organization. Within execution of the work with both the external
each of the process, the stages where there is a and the internal supplier.
stronger interface between customer-supplier are 2. Internal supplier: receives the order or
highlighted, giving way to concrete steps. In our request for work, the advisers select and
case study, the supervisors2 act strongly with both hire external suppliers within the pattern of
the supplier that is advisers3 and the contractor4, the organization, to carry out the work. The
because the supervisors evaluate the two types adviser supervises during the performance
of suppliers. of the external service supplier.
The way that defines the application process 3. External supplier: any contract that belongs
and work order5 is summarized as follows: to the pattern of suppliers of the organization
185
A Multicriteria Tool for Evaluating Performance of Service Suppliers
is available to contest for the work that the the staff survey was done through
organization needs to make, and the selec- a stratified sampling, which was
tion is realized according to the established relevant considering that the
criteria. population of the different plants
• Stage 2: Collecting and analyzing data. that use the services of internal
1. Development of format for data and external suppliers of study
collection: The format for data is divided into strata. This took
collection plan was established, into account within the population
which took into account only the (who are appointed applicants),
phases of strong interrelationship those with a greater percentage
between customer-supplier. In the for all services provided in a year,
format, there are no response op- received more services (higher
tions provided to respondents, in percentage of applicants). In
order not to bias their responses the Figure 3 shown by columns,
since what was sought was plants that make up the organi-
that both the stellar and bitter zation in the region such as the
moments were expressed. The zinc plant, smelting, refining,
significance of responses later fertirey, bermejillo, alezin and
helped to identify the strengths other areas.
and weaknesses in the interface
set, and thus take preventive and As shown in Figure 3, a comparative sample
corrective actions for continuous size was made with respect to all applicants vs.
improvement of the service. the higher percentage of requests made to service
2. Design of the sample size for the suppliers, because the population size is very small,
implementation of the survey: there is not a big difference between it and the
the design of the sample size of sample size. The survey was conducted with an
186
A Multicriteria Tool for Evaluating Performance of Service Suppliers
estimated error of 3% to 5%. Finally, the study Global benchmarks belonging to each defined
to 40 people was carried out. service level are intertwined with the dimensional-
ity of SERVQUAL, obtaining a final assessment
3. Application: pre-explanation on the meth- with the following characteristics: a) assesses
odology, the importance and impact on the levels of service previously identified, b) assesses
improvement of the assessment instrument, the stages where there is a strong customer-supplier
the survey applies to specific groups of relationship, c) contains the general criteria where
people. the perceptions and expectations of customers
4. Combination of information criteria: once are integrated with the dimensionality of the
the data format was filled by supervisors, service.
each of the criteria defined by plant and
per cycle was collected. Similarly, both the measurement and evaluation
stellar moments of truth, and the bitterness of classification criteria
were captured.
5. Determination of the frequencies on the Since the service is measured mostly by qualita-
basis of experience embodied by the super- tive attributes, how to measure these attributes is
visors: the frequencies were determined with a sequential series of services, it is necessary to
the criteria that were common to supervisors find the preferences of those who were involved
for every step of the service cycle rated. during the service process (Nelly, 1995). The
6. Diagram Frequency: once certain frequen- standard way of classification means of numeri-
cies were concentrated, we obtained con- cal averages. In this sense, they are averaged for
cepts in common. Finally global concepts each criterion along successive assessments, i.e.
were established, which in turn contain whether ci=(ci1,ci2,…,cip)′represents the vector of
all the provided by the supervisors. The average values of the criteria of the attributes for
weighting was determined by the individual the supplier, i=1,…,n and being a=(1/p,…,1/p)
criteria. where a is a vector of weights, then the overall
7. Final results: criteria that the supervisors average mi, for the i’th supplier is given by the
provided, reflect the need to evaluate both following expression:
the expectation (i.e. what they expect the
service will provide) and perceptions (what mi = ci' a, i = 1, 2, , n (2)
has finally be obtained from all their experi-
ences suppliers). However, the classification using this approach
can become complex because, speaking freely, the
ServQual as a Platform averages tend to be “very close” since the media
for evaluation has a minimal variance.
Another reasonable approach is to use a linear
'
The design of the instrument performance was combination, ri = ci , of the average values of
given after obtaining the general criteria together the criteria that has maximal variance. Principal
with their weights. However, SERVQUAL pro- component analysis (Mardia et al. 1979) provides
vides the five dimensions to evaluate any service, the vector γ=(γ,…γp)′.
as well as the analysis of the criteria provided by In fact the vector that maximizes the variance
the supervisors, involving the need to evaluate of linear combinations is the eigenvector associ-
both the perception and expectation, and these ated with the largest eigenvalue of the covariance
are the two main features of the model. matrix whose components are the global aver-
187
A Multicriteria Tool for Evaluating Performance of Service Suppliers
ages of the ratings of the performance criteria of 4. Once the weighting of criteria is known,
suppliers. we need to weigh the different alternatives
Another possibility is to use multi-criteria according to each criterion.
optimization tools, such as Analytic Hierarchy
Process (AHP) (Satty, 2000), because they in- At this point the matrix was constructed, mak-
corporate, by weight, customer preferences for ing assessments, with the valuation range of the
performance criteria, thus taking into account his tool itself. This is an mxm matrix which is denoted
or her opinion in the decision making. The weights as A={aij}, and is such that if aii=1 and if aij=x,
can be obtained from information contained in the then aji=1/x. A matrix is often called reciprocal.
survey. Indeed, preferences for the criteria are the See Figure 4.
relative frequencies of global benchmarks.
Following the steps (Aznar, J. 2006) to imple- 5. With the two previous processes c and d
ment the AHP model, the process was performed two matrices are obtained, a column matrix
for the classification of service suppliers: n×1 with the weighting of criteria (with n
the number of criteria) and a matrix m×n of
1. It starts with the interest of the decision- weights of the alternatives for each criterion
maker to select the most attractive among (where m is the number of alternatives).
all of them (strategies, investments, assets,
etc). Then Figure 5 is made up as follows:
The need to make decisions on suppliers who • First column: Displays the scale repre-
have entered the organization is relevant to any senting each of the criteria overall.
organization, since it can prevent re-work which • Second column: Indicates the number
are of high cost and the time of replenishment of items to evaluate. Rows shaded in red
from suppliers. represent the first evaluation cycle service
identified, the blue of the second cycle and
2. Define what criteria will be used to determine so on.
the selection, i.e. what characteristics that • Third column: Criteria to assess.
can make a more desirable alternative over • Fourth column: Shows the response op-
another. tions, consistent with the valuation range
of the tool itself.
These criteria were provided by the supervi- • Fifth column: Shows the value of each
sors, with whom he designed the assessment criterion according to the response option
tool. selected, which build the first matrix that
indicates the valuation of the criteria.
3. Once the alternatives are known and the cri-
teria defined, we must first order and balance With matrix A, an eigenvector close approach
the different interests of each of the criteria is obtained as follows: is 1=(1,…,1)′ a column
in the selection of alternatives through the vector m X 1; being
evaluation of the criteria in pairs.
An 1
ev(n) ←
The weight, just as was stipulated in the as- 1 ' An 1
sessment instrument, is contained in each of the A common formula, evaluate it until you find the
criteria. value of n, lets say n, so that |ev(nο)−ev(nο−1)|≤ε1,
188
A Multicriteria Tool for Evaluating Performance of Service Suppliers
with ε>0 an arbitrary but fix number, |z| represents on Figure 6. The normalized principal eigenvector
the vector of the absolute values of vector z y y≤z is also called priority vector.
it means that each element of vector y is, minor The next stage in to calculate λmax, the maxi-
or equal to its corresponding element of vector z . mum eigenvalue, so as to lead to the Consistence
ev(nο) will be the wished eigenvector, ε is the ap- Index, CI, defined as
proximation, and nο the number of iterations. This
process may be implemented in some program- −m
CI = max
189
A Multicriteria Tool for Evaluating Performance of Service Suppliers
190
A Multicriteria Tool for Evaluating Performance of Service Suppliers
4. Advisers: includes the general data of the Listening to the customer’s voice has always
consultants, who supervise external suppli- been of great importance in any of the methods
ers for the execution of the service, besides provided for measuring the quality of service.
they are also evaluated by the customer. However, the method proposed above is remark-
5. Reports: Through the report module is the able because of the direct collection of clients,
monitoring and the classification of suppli- focusing on the critical stages of client-supplier
ers, as joint assessments by the supplier, as interaction. Another key part of the methodology
well as the overall assessment. Compared was the detection of the moments of truth.
with other software packages available on With the input provided in the study by cus-
the market, the system selected had the fol- tomers, it was feasible to structure an assessment
lowing advantages: tool that includes their preferences, such as the
a. Improves the administration of assess- variables defined in the literature review and
ments, due to the filling directly into mentioned by prominent authors on the issue of
the system, updating of the database service quality using SERVQUAL.
faster. Furthermore, another important contribution
b. Ease in monitoring the daily perfor- of the work is related to the measurement criteria.
mance of suppliers. This is the difference between the use of averages
c. Easy to use, due to MS-Office or percentages and measurement using a specific
environment. vector considering the preferences of assessment.
d. Updated information. This type of assessment leads to a process of
e. Includes the appropriate evaluation continuous improvement and focuses on specific
criteria to the provided services. aspects that the organization wants to improve.
f. The inclusion of a statistical measure- The use of the tool Analytic Hierarchy Process
ment for the classification of suppliers, (AHP) in the selection, demonstrates its potential
it and being able to make decisions on for making decisions, but it is clear that the selec-
their performance. tion is just the first step in a process of outsourcing,
along the supply chain, because once the supplier is
concluSIon within the organization, the aim is to have a robust
supplier and be responsible for its development.
The quality of service is certainly a complex Similarly, another important contribution is the
topic that many companies, although interested visibility and transparency for all members of the
in the subject, find it difficult to address. It is well supply chain by providing preventive monitor-
known that the main reason of this is due to the ing to the performance of suppliers, which helps
intangibility of the service, it is perishable and it lower the costs of replacement of the suppliers
is heterogeneous, but this work has shown that with poor performance.
through a user-friendly tool, important results in Likewise, the use of technology facilitated the
the short term may result. implementation processes in the organization’s
In this study, we found it important to define supply chain. The ease of use and effectiveness
and detect both internal and external suppliers, as in the evaluation were the two main added values
well as the cycles and stages of services in which of the system developed. Thus, the combination
the organization has a close interrelationship with of methodological development and ease of use
them. In these stages is the critical time to assess through the computer showed its significant po-
the quality of services provided by suppliers. tential to use them together.
191
A Multicriteria Tool for Evaluating Performance of Service Suppliers
It is a fact that the use of these tools must be Belton, V., & Gear, T. (1983). On a Short-Coming
considered by any entity that provides services of Saaty’s Method of Analytic Hierarchies. Omega,
and/or wants to start a project to improve the 11(3), 228–230. doi:10.1016/0305-0483(83)90047-
quality of services rendered to them. However, in 6
preliminary experiments where the implementa- Benedetto, J., & Ferreira, P. (2000). Modern
tion to the supply chain of tangible products was Sampling Theory: Mathematics and Applications.
sought, excellent results have been achieved, that Boston: Birkhauser.
is why it is considered that it is feasible to use in
product supply chains. A future line of research, Brady, M. K., & Cronin, J. J. (2001). Some
involves the application to supply chain products New Thougths on Conceptualizing Perceived
and services, which involves the adequacy of Service Quality: A Hierarchical Approach. Jour-
the methodology and tool in this hybrid form of nal of Marketing, 65(3), 34–49. doi:10.1509/
jmkg.65.3.34.18334
operation.
Cantú, H. (2001). Desarrollo de una Cultura de
Calidad. New York: McGraw Hill.
referenceS
Carlzon, J. (1987). Moments of Truth. Cambridge,
Albrecht, K. (1998). La Revolución del servicio. MA: Ballinger Publishing Co.
3R Editores LTDA. Cassel, P., Eddy, C., & Price, J. (2002). Aprendiendo
Microsoft Access. Pearson Educación.
Albrecht, K., & Zemke, R. (1985). Service
America. New York:Mc.Graw Hill. Cedillo, M., Sanchez, J., & Sanchez, C. (2006).
The new relational schemas of inter-firms coopera-
Aznar,J.(2006)JerónimoAznarBellver-Dialnet,[en
tion: the case of the Coahuila automobile cluster
línea], Retrieved July 30, 2066, http://dialnet.uniro-
in Mexico. International Journal of Automotive
ja.es/servlet/extaut?codigo=336[07.30.2006] Technology and Management, 6(4), 406–418.
Beamon, B. (1998). Supply Chain Design and doi:10.1504/IJATM.2006.012233
Analysis: Models and Methods. International Chase, A. Jacobs. (1998). Production and Op-
Journal of Production Economics, 55(3), 281–294. erations Management. Eighth edition, New York:
doi:10.1016/S0925-5273(98)00079-6 McGraw Hill.
Beamon, B. (1999). Measuring supply Chain Chen, S. J., & Hwang, C. L. (1991) Fuzzy Multiple
Performance. International Journal of Opera- Atribute Decision Making: Methods and Applica-
tions & Production Management, 19(3), 275–292. tions. Lecture Notes in Economics and Mathemati-
doi:10.1108/01443579910249714 cal Systems, No. 375. Berlin, Germany.
Beesley, A. (1996). Time compression in supply Cronin, J. J., & Taylor, S. (1992). Measuring
chain. Industrial Management & Data Systems, Service Quality: A Reexamination and Exten-
96(2), 12–16. doi:10.1108/02635579610112606 sion. Journal of Marketing, 56(July), 55–68.
doi:10.2307/1252296
Bellido, L. (2004). Metodología para la Evalu-
ación de Servicios de Telecomunicaciones desde Cronin, J. J., & Taylor, S. a. (1994). SERVPERF
la perspectiva del usuario. Dpto. de Ingeniería de versus SERVQUAL: Reconciling performance
Sistemas Telemáticos, Universidad Politécnica based and perceptions-minus-excpectations mea-
de Madrid. surement of service quality. Journal of Marketing,
58, 125. doi:10.2307/1252256
192
A Multicriteria Tool for Evaluating Performance of Service Suppliers
Crosby, P. (1984). Quality Without Tears. New Khurrum, S., & Bhutta y Faizul, H. (2002). Sup-
York: McGraw Hill. plier selection problem: a comparison of the
total cost of ownership and analytic hierarchy
Duclos, L., Vokurka, R., & Lummus, R. (2003). process approaches. Supply Chain Manage-
Conceptual Model of Supply Chain Flexibility. ment: An International Journal, 7(3), 126–135.
Industrial Management Data Systems, 103(6), doi:10.1108/13598540210436586
446-456.Eiglier, P. & Langeard, E. (1991). El mar-
keting de servicios. New York: McGraw Hill. Mardia, K. V., Kent, J. T., & Bibby, J. M. (1979).
Multivariate Analysis. New York: Academic
Evans, J., & Lindsay, W. (2001). The management Press.
and control of quality. Quinta edición, South-
Western College Pub. Martínez, A., Cantú, M., Cedillo, G., & Arriaga, J.
(2006) Medición del desempeño de proveedores de
Fernández, M. (1996). Como medir la calidad en servicio y su importancia en la cadena de suminis-
los servicios. Información Comercial Española tro. XXVIII Congreso Internacional Calzatecnia,
ICE: Revista de economía, 755,113-125. León Guanajuato.
Flores, A. (2004), Medición de la efectividad de la Martínez, E., & Escudey, M. (1998). Evaluación
cadena de suministro. Primera edición, Panorama y decisión multicriterio. UNESCO-Editorial Uni-
Editorial. versidad de Santiago, Chile.
Franceschini, F., & Cignetti, M. (1998). Compar- Nelly, A., Gregory, M., & Platts, K. (1995). Perfor-
ing tools for service quality evaluation. Interna- mance Measurement System Design. International
tional Journal of Quality, 3(4). Journal of Operations & Production Management,
16(4), 19–34.
Gronroos, C. (1982). Strategic Management and
Marketing in the Service Sector. Helsingfors: Normann, R. (1991). Service Management: Strat-
Swedish School of Economics and Racine. egy and Leadership in Service Business. Second
Edition, pp. 16-17. New York: John Wiley & Sons
Gronroos, C. (1984). Strategic Management and Ltd.
Marketing in the Services Sector. Helsingfors:
Parasuraman, A., & Zeithaml., V. A. (2004). Service
Swedish School of Economics and Business
Quality. Marketing Science Institute.
Administration.
Parasuraman, A., Berry, L. L., & Zeithaml, V. A.
Heung, V., Wong, M., & Qu, H. (2000). Airport-
(1991). Understanding customer expetations of
restaurant service quality in Hong Kong. The
service. Sloan Management Review. Cambridge,
Cornell Hotel and Restaurant Administration MA: Harvard Business Press.
Quarterly, 41(3), 86–96.
Parasuraman, A., Zeithaml, V. A., & Berry,
Hossein, M. (2002). Supply Chain: Crisp and L. L. (1985). A Conceptual Model of Service
Fuzzy Aspects. International Journal Appl. Math. Quality and Its Implications for Future Re-
Computer Science, 12(3), 423–435. search. Journal of Marketing, 49(Fall), 41–50.
Jankowicz, A. (1991). Business Research Projects. doi:10.2307/1251430
London: Chapman and Hall. Parasuraman, A., Zeithaml, V. A., & Berry, L. L.
Juran, J. (2001). Manual de Calidad. New York: (1988). SERVQUAL: A Multiple Item Scale for
Measuring Consumer Perceptions of Service Qual-
McGraw Hill.
ity. Journal of Retailing, 64(1), 12–40.
193
A Multicriteria Tool for Evaluating Performance of Service Suppliers
Ruiz-Olalla, C. (2001). Gestión de la calidad del Vandaele, D., & Gemmel, P. (2007). Purchased
servicio, [en línea] 5campus.com, Control de business services influence downstream sup-
Gestión. Retrieved May 24, 2009, from http:// ply chain members. International Journal of
www.5campus.com/leccion/calidadserv Service Industry Management, 18, 307–321.
doi:10.1108/09564230710751505
Saaty, T. (1980). The Analytic Hierarchy Process.
New York: McGraw Hill International. Venkataramanan, M. V. (1998). Special Research
Focus on Supply Chain Linkages: Challenges
Satty, T. (2000). Fundamentals Of Decision Mak-
for Design and Management in the 21st Century.
ing and Priority Theory. Pittsburgh, PA: RWS
Decision Sciences, 29(3).
Publications.
Wang, G. (2004). Manufacturing Supply Chain
Seth, N., Deshmukh, G., & Vrat, P. (2005). Service
Design and Evaluation. International Journal of
quality models: a review. International Journal
Advanced Manufacturing Technology, 25, 93–100.
of Quality & Reliability Management, 22(9),
doi:10.1007/s00170-003-1791-y
913–949. doi:10.1108/02656710510625211
Wei-Ning, P., & Chinyao, L. (2005). Supplier
Seth, N., Deshmukh, G., & Vrat, P. (2006a).
evaluation and selection via Taguchi loss functions
A framework for measurement of quality of
and an AHP. International Journal of Advanced
service in supply chains. Supply Chain Manage-
Manufacturing Technology, 27(5-6).
ment: An International Journal, 11(1), 82–94.
doi:10.1108/13598540610642501 Yin, R. (1989). Case Study Research: Design
and Methods. 2nd Edition, Newbury Park, CA:
Seth, N., Deshmukh, G., & Vrat, P. (2006b). SSQSC:
Sage
a tool to mesure supplier service quality in supply
chain. Production Planning and Control, 17(5), Zeithaml, V., Berry, L., & Parasuraman, A. (1988).
448–463. doi:10.1080/09537280600741764 Communication and control processes in the de-
livery of service quality. Journal of Marketing,
Stuart, I., McCutcheon, D., Handfield, R.,
52, 35–48. doi:10.2307/1251263
McLachlin, R., & Samson, D. (2002). Effec-
tive case research in operations management: Zeithaml, V., Berry, L., & Parasuraman, A. (2004).
a process perspective. Journal of Operations Service Quality. Marketing Science Institute.
Management, 20(5), 419–433. doi:10.1016/
S0272-6963(02)00022-0
Terzi, S., & Cavalieri, S. (2004). Simulation endnoteS
in the supply chain context: a survey. Comput-
ers in Industry, 53, 3–16. doi:10.1016/S0166-
1
Elaboration process of a service, i.e. all the
3615(03)00104-0 organization of the physical human elements
in the client-company relationship, necessary
Triantaphyllou, E. (2000). Multi-criteria decision to the realization of a service (Eiglier P., and
making methods: a comparative study. The Neth- Langeard E.,1991)
erlands: Kluwer Academic Publishers. 2
Plant staff
3
Engineering department, internal suppliers
4
External suppliers
5
The difference between the application
process and the work order is the cost
194
195
Chapter 11
Analyzing Requirements and
Approaches for Sourcing
Software Based Services
G.R. Gangadharan
Novay, The Netherlands
Erwin Fielt
Queensland University of Technology, Australia
aBStract
Increasingly, software is no longer developed as a single system, but rather as a smart combination of
so-called software services. Each of these provides an independent, specific and relatively small piece of
functionality, which is typically accessible through the Internet from internal or external service provid-
ers. To the best of our knowledge, there are no standards or models that describe the sourcing process
of these software based services (SBS). We identify the sourcing requirements for SBS and associate the
key characteristics of SBS (with the sourcing requirements introduced). Furthermore, we investigate the
sourcing of SBS with the related works in the field of classical procurement, business process outsourc-
ing, and information systems sourcing. Based on the analysis, we conclude that the direct adoption of
these approaches for SBS is not feasible and new approaches are required for sourcing SBS.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Analyzing Requirements and Approaches for Sourcing Software Based Services
standardized products and services in a stable • The sourcing approaches in the field of
environment. However, the abovementioned classical purchasing, business process out-
developments are much more difficult to accom- sourcing, and information systems sourc-
modate with traditional IT systems. ing can guide the sourcing process of SBS
A flexible and integrated approach to the to a certain extent.
development of business services and their sup- • As the sourcing requirements of SBS have
porting software, will contribute to more agility a close knit relationship with the key char-
and a better alignment between business and IT. acteristics of SBS, the direct adoption of
The business perspective – business processes, these approaches for SBS cannot be fea-
functional specifications, information models, sible. New approaches are required for
and service level agreements – can be taken as the sourcing SBS.
starting point. This is combined with a different
approach to software: “thinking in services”. For As the concept of SBS is gaining more and
example, think of on-line services for checking more prominence, sourcing of SBS emerges as a
creditworthiness of customers, processing credit promising area of research, requiring the interdisci-
card payments, or computing exchange rates. plinary convergence of supply chain management
These are just small examples of a much more and information technology.
profound development. Next to that, we also see
entire software packages delivered as an online
service, as witnessed by the success of companies SoftWare BaSed ServIceS
such as Salesforce.com.
Increasingly, business software is no longer thinking in terms of Services
developed as a single system, but rather as a
smart combination of so-called software services. Service is a widely used term, with different
Each of these provides an independent, specific meanings in different disciplines. In economics,
and relatively small piece of functionality, which a service is claimed to be a process that creates
is typically accessible through the Internet from benefits by facilitating either a change in custom-
internal or external service providers. This raises ers, a change in their physical possessions, or a
the issue of sourcing these software based services change in their intangible assets (Hill, 1977).
(SBS). Sourcing of SBS presents a considerable Service provision has been defined as an eco-
challenge because it should align a number of nomic activity that does not result in ownership,
organizational processes on strategic, tactical, and and this is what differentiates it from providing
operational levels. To the best of our knowledge, physical goods.
there are no standards or models for dealing with In marketing, a service is a process that re-
the sourcing process of services completely. lates to the performance of an activity executed
In this paper we will address the what of sourc- in co-operation with the customer (Grönroos,
ing of SBS (sourcing requirements) and the how of 2007). Four basic characteristics of (consumer)
sourcing SBS (sourcing approaches). The salient services are often emphasized in defining ser-
contributions of our paper are as follows. vices (Zeithaml, Parasuraman, & Berry, 1985):
Intangibility or non-material, inseparability of
• We identify certain service requirements production and consumption, heterogeneity (non-
for sourcing SBS and we associate the key standardization) of service outcome and processes,
characteristics of SBS with these sourcing and perishability (cannot be stored). However,
requirements. this is mostly directed at services involving a
196
Analyzing Requirements and Approaches for Sourcing Software Based Services
197
Analyzing Requirements and Approaches for Sourcing Software Based Services
198
Analyzing Requirements and Approaches for Sourcing Software Based Services
the expected delay between the moment As services are decoupled by hiding the ser-
when a service request is sent and the mo- vice implementation, consumers are skeptic over
ment when the service is rendered). security, privacy, and trust aspects of services.
• Availability: The probability for a service Though there is a high level of security standards
being accessed properly in an observation offered by services, organizations hesitate to go
period. for a service based software solution in case of
• Integrity: The quality aspect of how the an application involving highly confidential logic
service maintains the correctness of the and sensitive data.
interaction in respect to the source.
Service costs
A service consumer can discover a service
specifying his expected level of qualities, in addi- Making use of SBS comes at a cost, the price of
tion to a specified functionality. Furthermore, the the service, which is usually a subscription fee and
design by contract approach of services clearly often (partially) related to the actual use (Cheng
defines and describes the service level quality et al., 2003 and Gunther et al., 2006).
and terms of use of a service. This helps a service In a dynamic market environment, the cost of
consumer understand whether the offered service a service depends on the perspectives of service
meets her expected quality requirements, thereby consumers and service providers. A service con-
making the sourcing decision clearer. sumer assesses how much she values the service
and what she can afford to pay for the service.
Security, Privacy, and trust aspects This also requires forecasting the usage level of
a service. From the perspective of service provid-
As data can be either sensitive to consumers or ers, the estimation of cost of producing a service
critical to business applications, an organization and the return on investment plays a critical role
needs to be highly careful in procuring services. in determining the price.
Most organizations are skeptic in adopting Part of the service costs considerations may
services because certain data is needed to be be a comparison with the costs of purchasing the
shared with service providers that may cause software as a package. A software package has two
data confidentiality and data integrity issues. types of costs: acquisition costs and maintenance
Following are some of the important factors costs. It is important not to compare service fees
related to security for a service to be considered with both types of costs and not only the acquisi-
by a consumer. tion costs. An important cost advantage of services
is that they are executed in hosted infrastructure
• Selecting service providers using en- at the service provider’s side, so there are no
hanced network security mechanisms for maintenance costs at the consumer side.
exchanging messages.
• Analyzing the access control policies and deployment efforts and resources
monitoring infrastructure adopted by the
service provider (Coetzee & Eloff, 2007). Sourcing SBS always requires time and resources
• Understanding the procedures adopted by from an organization with respect to deployment.
service providers for intrusion prevention Moreover, depending upon the gap between the
and vulnerability management. required service functionality and the provided
service functionality (after customization), it may
199
Analyzing Requirements and Approaches for Sourcing Software Based Services
200
Analyzing Requirements and Approaches for Sourcing Software Based Services
be related to some of the strategic and tactical ac- process stresses the importance of understanding
tivities (supplier selection, contract management) the interfaces between the different steps well
while the operational activities will be more of an by defining the output of each step clearly. Van
‘implement and use’ than an order process. It can Weele’s generic purchasing process describes the
be expected that the sourcing process for SBS will procurement for products. The phases of ordering
also differ per purchasing situation with respect and expediting are not applicable for sourcing of
to newness (new-task situation, modified rebuy SBS. The remaining phases can be applicable in
or straight rebuy) and complexity (the dominant sourcing SBS.
function in the decision making unit). Because SBS A danger of relying too much on classical
are relatively new phenomena, it can be expected purchasing insights, however, is that in general
to be perceived as a new-task situation with a high this literature is more directed towards the pur-
complexity. It may involve reconsidering strategic chasing of goods. According to Van Weele (2005),
and tactical choices and involving business, IT, the purchasing of services should be approached
financial and purchasing expertise. differently because the client is also involved in
The Michigan State University (MSU) model the production process. Furthermore, the classical
(Monczka, et al., 2005) has been well studied purchasing literature focuses little or no attention
by researchers and is used by a large number of on the IT domain.
practitioners, amongst them some of the largest
organizations. The MSU model provides a solid Sourcing of SBS in Business
basis for creating a mature sourcing function with Process outsourcing Perspectives
purchasing excellence, which will also be relevant
for sourcing SBS. It also recognizes the need for Whether sourcing of SBS also involves actual ‘out-
mature enabling processes, which may be easily sourcing’, which entails transferring responsibility
overlooked in a discussion about sourcing SBS and resources from the internal organization to an
from a business or technology perspective. The external organization, will depend upon which
enabling process of developing organization and kind of services an organization is targeting and
teaming strategies stresses the need for functional whether it concerns new or existing applications.
cooperation and integration, which will also be For example, sourcing an electronic dictionary as
important for sourcing SBS where business units, a service may be more like product procurement
the purchasing function and the IT function will than IT outsourcing.
all play a role. With respect to the sourcing life-cycle model
A generic purchasing process illustrated by Van of Cullen et al. (2005), the phase of ‘investigate’
Weele (2005) starts with defining a specification (building block 1) will be of particular importance
followed by selecting a supplier and agreeing on because of the relative immaturity of the SBS
a contract. Thereafter, the process continues with market with inexperienced clients and limited
ordering and expediting followed by evaluation. service providers. ‘Target’ (building block 2) and
The first three steps represent tactical purchas- ‘design’ (building block 4) seem critical phases
ing functions and are primarily of a technical- because of the importance of finding suitable
commercial nature. The last three steps represent services to outsource and creating the right sourc-
operational purchasing (or ordering) function ing designs. Because it may be wise to start SBS
and are primarily of a logistics-administrative with a limited scope and the need to first gain
nature. As these steps are closely connected, the experience, ‘strategize’ (building block 3) seems
problems in one step are often caused by defi- less relevant for now. ‘Negotiate’ (building block
ciencies in a previous step. Hence, the Van Weele 6) and ‘transition’ (building block 3) will mostly
201
Analyzing Requirements and Approaches for Sourcing Software Based Services
not be substantially different from traditional literature also discuss the same key criteria relate
outsourcing, maybe even simpler because of the to effectiveness (core competences), efficiency,
‘design-by-contract,’ ‘invocation based pricing’ quality (capabilities), flexibility, innovation,
and ‘decoupling’ characteristics of SBS. finance, and technology.
The eSourcing Capability Model (eSCM) There is a whole range of outsourcing arrange-
(Hefley et al., 2005, Hyderr et al., 2006) covers ments that are more or less favorable depending
the sourcing of services for (IT-intensive) busi- upon the objectives and the conditions, such as
ness processes. This, however, also means that the contract-out and preferred contractor (Lacity et
model and practices are quite generic in nature al., 1996). It seems that SBS literature too often
and need to be supplemented for SBS. A major extrapolates the delivery model into a sourcing
difference for SBS may be that it becomes pos- design and, therefore, favors more dynamic and
sible to source finer grained services efficiently competitive form of sourcing. For example, a key
and effectively, increasing the number of options characteristic such as ‘modularity’ is used to argue
for selective outsourcing but also increasing its that services will be sourced form marketplace
complexity. This may require more advanced like service cloud. However, one could also argue
portfolio management and architectural matu- that with respect to transformational outsourcing,
rity. As services are opaque in nature (hiding the modularity can make radical renewal easier and,
implementation from the interface), the service therefore, results in strategic partnerships. It seems
provider capabilities become less relevant from that a more ambitious SBS approach is suited for
the perspectives of service consumers. How- a high level of enterprise architecture maturity,
ever, the client will also experience the negative from business modularity onwards.
consequences of service failure by the service
provider and contracts cannot specify everything Sourcing of SBS in Information
in advance. Moreover, as the capability models Systems Sourcing Perspectives
show, the performance of a service provider is also
determined by capabilities that are not directly The sourcing decisions from the information sys-
related to service delivery, for example, process tems (IS) perspectives differ substantially form the
re-engineering and customer development. To purchasing and outsourcing perspective. Making
what extend this will matter for SBS will, on the a decision to buy or develop a software is rather
one hand, be determined by the sourcing design a difficult task. As buying or developing software
(for example, resource or result focused) and, on have their own pros and cons, the decision is promi-
the other hand, the type of service sourced, in nently based upon satisfying the requirements of
particular the extent to which the ‘modularity’ and an organization. Some of these factors of decision
‘and ‘decoupling’ characteristics of the software making in software also impact the sourcing deci-
service applies for the business service. sion of SBS. SBS seem to some extent a continua-
In general, the sourcing decision discussions in tion of the hybrid solutions with key characteristics
purchasing literature and in outsourcing literature such as ‘modularity’ and ‘decoupling’ that make a
are very similar. Both address different scopes of hybrid solution more feasible.
outsourcing, such as turnkey/total or partial/selec- The Generic Software Acquisition Reference
tive. In line with this aspect, SBS can be sourced Process (GARP) (Getto et al., 2000) is a model
at different levels of granularity. Because of the based on SPRITE-S software acquisition initia-
‘modularity’ and ‘decoupling’ characteristics of tives (now renamed as Information Services
SBS, the options for sourcing from different sup- Procurement Library). GARP is a hierarchical
pliers will increase. Purchasing and outsourcing life cycle model containing the processes of ac-
202
Analyzing Requirements and Approaches for Sourcing Software Based Services
quisition initiation, the procurement process, and one single contract, involving tendering, contract
review of acquisition. Each process further consists monitoring, and contract completion. The acquisi-
of several sub-processes. These sub-processes do tion completion is the formal completion of all the
not have any logical sequence as the represented contracts of the acquisition. The ISPL framework
sub-processes possess parallel and continuous for procuring services seems to be fit for procuring
characteristics. GARP is a generic process that SBS. However, the acquisition initiation phase
guides the improvement of existing software does not detail exactly the requirements for sourc-
acquisition methods. Though GARP focuses on ing SBS. The procurement process of ISPL gives
software, the fundamental principles of GARP can significant attention to contract monitoring and
be applicable for services. However, in a sourcing contract completion. In this way, ISPL focuses
process for services, the sub-processes are less more on tactical level operations in sourcing. The
significant. GARP does not distinguish between definition of a service in the perspective of the
the different types of software that needed to be ISPL is broader in scope and this is the reason that
acquired. As software and SBS are significantly the ISPL does not focus specifically on SBS.
different in characteristics, the process of acqui-
sition initiation for software differs significantly
from that of services. Thus, GARP becomes less evaluatIon of SourcIng
applicable in the field of SBS. aPProacheS for SBS
The Information Services Procurement Library
(ISPL) (Op de Coul, 2005) provides a frame- In general, the classical purchasing literature
work for acquiring and managing IT projects offers the widest and deepest source of sourc-
(e.g. system development) and ongoing services ing knowledge. However, it may be less suited
(e.g. managed services). According to ISPL, the for services as it mostly focuses the purchasing
acquisition process consists of three sequential of goods. This may, however, be only a limited
process steps: acquisition initiation, procurement problem for SBS because they to some extend
(one or more), and acquisition completion. The may be more like goods than traditional services
acquisition initiation process produces an acqui- because they require no or little human involve-
sition plan that reflects an acquisition strategy, ment in service delivery. The strength of business
along with a clear understanding of systems and process outsourcing approaches is that they focus
services requirements defining the acquisition on IT-intensive business services, although this
goal. The procurement process describes obtaining can be too generic for or different for SBS (also
203
Analyzing Requirements and Approaches for Sourcing Software Based Services
includes, for example, human helpdesk for IS/IT purchasing, business process outsourcing, and IS
support). However, sourcing SBS may not always sourcing can guide the sourcing process of SBS to
involve outsourcing with respect to the transfer of a certain extent. However, we have explicated that
internal activities and resources to external service the key characteristics of SBS inhibit the adoption
providers. The IS procurement literature adds to of these classical purchasing models for SBS. The
the purchasing and outsourcing literature the more existing sourcing models need to be adapted by
technical perspective where system integration considering the characteristics of services. We are
and transition are important issues. currently working in the direction of developing
Based on the different sourcing concepts from new sourcing designs for SBS, focusing on the
classical purchasing, business process outsourcing, integration of services from different vendors.
and IS procurement, we made an assessment of ap-
plication of the presented approaches for sourcing
SBS (Table 3). These different approaches, adapted referenceS
to SBS and used in combination, can provide a
suitable starting point for sourcing SBS. Bruno, F. (2006, July). Executing an IP Protec-
tion Strategy in a SaaS Environment. Contract
Management. Magazine, NCMA, USA.
concludIng remarKS Cheng, H. K., Demirkan, H., & Koehler, G. (2003).
The Price and Capacity Competition of Applica-
The adoption of SBS means that the business and IT tion Services Duopoly. Information Systems and
functions have to deal with external service provid- e-Business Management. 1(2).
ers. This requires making sourcing decisions and
the involvement of the purchasing function. While Coetzee, M., & Eloff, J. H. P. (2007). Web
external sourcing of services and IT is not new services Access Control Architecture In-
(for example, helpdesk support), external sourcing corporating Trust. Internet Research, 17(3).
of software services is. This raises the question doi:10.1108/10662240710758939
to what extent existing sourcing approaches can
Cullen, S., Seddon, P., & Willcocks, L. (2005).
be used for SBS and what are specific sourc-
Managing IT outsourcing: The life cycle impera-
ing requirements for SBS. Moreover, to benefit
tive. MIS Quarterly Executive, 4, 229–244.
from SBS, the sourcing should be performed in
a effective and efficient manner. This requires a Gangadharan, G. R., & D’Andrea, V. (2009).
close cooperation between the IT function and the Service Orientation: Licensing Perspectives.
purchasing function. We propose that this requires, Journal of International Commercial Law and
on the one hand, a thorough understanding of Technology., 4(1).
SBS by the purchasing function in particular the
Getto, G., Gantner, T., & Vullinghs, T. (2000).
sourcing requirements for the specification. And,
Software Acquisition: Experiences with Models
on the other hand, this requires a more informed
and Methods. In Proceedings of the EuroSPI.
IT function with respect to the different sourcing
design options. Grönroos, C. (2007). Service Management and
Sourcing of SBS is rather a new emerging Marketing: Customer Management in Service
field of research. In this paper, we have identi- Competition (3rd ed.). Chichester, UK: John
fied that the sourcing requirements for SBS have Wiley and Sons.
a close knit with the key characteristics of SBS.
The sourcing approaches in the field of classical
204
Analyzing Requirements and Approaches for Sourcing Software Based Services
Gunther, O., Tamm, G., & Leymann, F. (2006). Mani, A., & Nagarajan, A. (2002). Understanding
Pricing Web Services. In Dagstuhl Seminar Pro- Quality of Service for Web Services. Retrieved
ceedings 06291 (The Role of Business Processes from http://www.ibm.com/developerworks/li-
in Service Oriented Architectures). brary/ws-quality.html
Han, K., Kauffman, R. J., & Nault, B. R. (2004). Maximilien, M., & Toward, S. M. (2005). Web
Information Exploitation and Interorganizational Services Interaction Styles. In Proceedings of
Systems Ownership . Journal of Management IEEE Services Computing Conference (SCC).
Information Systems, 21(2).
McCord, A. (2003) Sourcing Information Technol-
Hefley, W., Loesche, E. A., Khera, P., & Siegel, ogy Services. In P. McClure (ed), EDUCAUSE
J. (2005). A Framework for Best Practices in Leadership Strategies Series, Volume 7 – Manag-
the Sourcing Life-cycle: The Architecture of the ing Information Resources, EDUCAUSE. New
eSourcing Capability Model for Client Organi- York: John Wiley and Sons.
zations. In ITsqc Working Paper Series CMU-
Monczka, R., Trent, R., & Handfield, R. (2005).
ITSQC-WP-05-001.
Purchasing & supply chain management (3rd ed.).
Hill, T. (1977). On Goods and Servic- Mason, OH: Thomson.
es. Review of Income and Wealth, 23(4).
Op de Coul, J. (2005). IT Services Procurement
doi:10.1111/j.1475-4991.1977.tb00021.x
based on ISPL. The Netherlands:van Haren
Hyderr, E., Heston, K., & Paulk, M. (2006). The Publishers.
eSourcing Capability Model for Service Providers
Robison, L. (2007). The CIO Dilemma: Build,
V2.01 (Tech Report), Pittsburgh, PA: Carniege
Buy or Borrow. Burton Group Report.
Melon University.
Sprott, D. (2006). Service Architecture and En-
Lacity, M. C., Willcocks, L. P., & Feeny, D. F.
gineering. CBDI Journal. July/August.
(1996). The value of selective IT sourcing. Sloan
Management Review, 37, 13–25. Van Weele, A. J. (2005). Purchasing & supply
chain management: Analysis, strategy, planning
Lankhorst, M., et al. (2005). Enterprise Architec-
and practice (4th ed.). London: Thomson.
ture at Work. New York: Springer Publications.
Wilkes, L. (2004). Principles of Service Orienta-
MacKenzie, M., Laskey, K., McCabe, F., Brown,
tion. CBDI Journal, March.
P., & Metz, R. (2006). Reference Model for Service
Oriented Architecture. Retrieved from http://docs. Zeithaml, V. A., Parasuraman, A., & Berry, L.
oasis-open.org/soa-rm/v1.0/soa-rm.pdf L. (1985). Problems and strategies in services
marketing. Journal of Marketing, 49, 33–46.
doi:10.2307/1251563
205
206
Chapter 12
Supplier Relationship
Management in Health Care
Tobias Mettler
University of St. Gallen, Switzerland & SAP Research St. Gallen, Switzerland
Peter Rohner
University of St. Gallen, Switzerland
aBStract
The structural transformation of modern societies (e.g. aging of population, mobility) as well as con-
tinuously increasing market dynamics (e.g. mergers, technological advancement) induce health care
organizations, more than ever, to reduce their costs while enhancing service delivery at the same time.
In other industrial sectors this was achieved by optimizing cooperation, coordination, and communica-
tion particularly with regard to the supplier base. However, as the pressure to innovate will increase
extensively in the next years, similar developments are becoming relevant for the health care supply
chain, too. In this chapter we therefore adapt the current findings on supplier relationship management
(SRM) to the health care context. We analyze theoretical foundations of SRM and explore one particular
area of application in health care, namely the ordering of pharmaceuticals by hospitals. On the basis
of a case study we develop a future scenario for drugs supply management and discuss potential per-
formance and quality improvements.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Supplier Relationship Management in Health Care
significantly as in many countries new economic handling and processing material and purchasing
principles, such as lump sums for medical treat- orders, while in competitive industries this amount
ments, are introduced in order to reduce health is less than 10 percent (Grossman, 2000).
expenditures and enhance the competition among Some evidence suggests that this is going to
health care providers. change. To some extent hospital purchasing de-
Although labor costs constitute the major share partments already are stipulated to contribute to
of the total costs of a medical treatment, there revenue increases and to knowledge acquisition.
is still a high economic potential in improving Hence, the role of the supplier who formerly was
expenditure on products and services (European considered to be an opponent (e.g. within price
Commission, 2006; The Chartered Institute of Pur- negotiations) will change to a business partner
chasing & Supply, 2005). Supplier Relationship who contributes an added value to the hospital and
Management (SRM), understood as approach to therefore needs to be better involved in terms of
systematically managing an organization’s inter- cooperation (business relationships), coordination
actions with the companies that supply products (processes and work practices), and communica-
and services to it, can help to reduce costs and tion (electronic services).
enhance quality of service delivery (Mettler & As a consequence, the concept of SRM will
Rohner, 2008). However, since hospital buying become more relevant for health care organizations
agents were only expected to attain the best price as well as for supply chain management research.
for the needed goods in the recent past, the trust Because the hitherto existing literature is mainly
between the buyer and the supplier is weak and focused on industrial enterprises, it is the aim of
the relationship is antagonistic. Therefore, and this chapter to provide a sector-specific discussion.
in contrast to industries with intense competition In taking a different approach to perceive SRM,
like for example the automotive or the consumer the understanding of possible impacts of SRM
electronics industry, SRM is not paid much atten- will be enhanced and encourage the application
tion to in health care academia and practice yet. of these concepts and electronic services.
Although the adoption of electronic services saves In order to achieve this goal, the chapter is
the costs of the preparation and transmission of organized as follows. First, we examine distinct
paper requests and invoices and eliminates costly, definitions and theoretical foundations of SRM
time-consuming errors from manual data entry in order to provide an overview of the field. After
by connecting ordering systems with production this, we discuss the basic constructs of SRM such
systems (Brynjolfsson & Yang, 1996), only 38 as types of business relationships, typical processes
percent of the German hospitals implemented and work practices as well as exemplary electronic
an electronic purchasing order and 35 percent services supporting the implementation of SRM
an electronic invoice (German Association for activities. To reference to the health care sector, we
Medical Technology, 2007). In Switzerland, the then explore the particularities of this industry and
origin of this research, no such evidence exists so its influence on SRM. In the section that follows,
far, but considering the similarities between the we present a case study on the pharmaceuticals
health systems the adoption rate should be more supply management of three Swiss hospitals in
or less at the same level. This ratio is diminutive order to illustrate the potential value of SRM for
compared to the aviation industry where 85 percent health care organizations. Finally, we present some
of the organizations actively use e-procurement in concluding remarks and offer some suggestions
their daily business. Between 35 and 40 percent for future research endeavors.
of hospital supply-related costs are caused by
207
Supplier Relationship Management in Health Care
208
Supplier Relationship Management in Health Care
209
Supplier Relationship Management in Health Care
210
Supplier Relationship Management in Health Care
Other frameworks such as from (Eyholzer, Klein, 2002) state that monitoring and controlling
Kuhlmann & Münger, 2002; Riemer & Klein, of the suppliers’ performance as well as conjoint
2002) complement the prior described view by project and change management are crucial for
integrating the management perspective. They enhancing the relationship between an enterprise
bring forward the argument that in order to effec- and its suppliers. As a result, (Riemer & Klein
tively control and design an enterprise-supplier- 2002) present the only approach that explicitly
relationship, activities beyond the pure handling integrates team building and social networking as
of market transactions are required. Nevertheless, part of their framework in order to operationalize
the depth of considering management processes change and project management on a business
as part of SRM differs. For example, (Riemer & level.
211
Supplier Relationship Management in Health Care
At last, (Appelfeller & Buchholz, 2005) take a Piccinelli & Turfin, 1999), we therefore conceive
step forward and include human resources devel- services as the electronic virtualization of business
opment and at least partially IT-Management in relationships or activities.
their SRM process framework (which we consider In recent years, especially the virtualization
a support process). They argue that for an effective of business relationships with customers was
coordination of business processes not only man- expedited (Parvatiyar & N. Sheth, 2001). Hence,
agement processes are needed but also the training different types of analytical, collaborative and
of the buying agents as well as the alignment with operational services were developed for CRM
the IT- personnel because they play a key role in (Adebanjo, 2003; Dyché, 2001; Zeng, Wen &
the realization of that coordination. Yen, 2003). We use the same differentiation for
SRM services (and extend it with a ‘supportive’
dimension) in order to categorize the identified
electronic Services Supporting
exemplary instantiations (see Table 2).
Srm (communication)
Analytical SRM (aSRM) aims at storing, ana-
lyzing, and applying knowledge about suppliers
With the emergence of the Internet enterprises
and personnel dedicated to manage the supplier’s
have numerous opportunities at their disposal
relationship. For this purpose, typical performance
for doing business and for communicating with
management and decision support tools (e.g. busi-
business partners all over the world. Communica-
ness intelligence, on-line analytical processing,
tion, as used in this chapter, is thus understood
statistics and reporting tools, data warehousing,
as exchange of information (Merriam-Webster
data mining) are used.
Online Dictionary, 2009). In doing so, a wide
The purpose of collaborative SRM (cSRM) is
range of electronic services (in the following
to improve the quality of supplier communication,
referred to as ‘service’) is available these days to
support the communication. In line with (Marton, and, as a result, increase supplier performance
212
Supplier Relationship Management in Health Care
213
Supplier Relationship Management in Health Care
214
Supplier Relationship Management in Health Care
According to (Mettler & Rohner 2009a) this can a center stage within a CIS, providing for
be found in medical applications, which aim at example information on allergy, history,
storing, retrieving, processing and analyzing infor- medications in use, diagnoses, weight, and
mation for the purpose of prescribing, dispensing, age appropriate to the medication (Chung,
and administering of pharmaceutical products, as Choi & Moon, 2003).
well as in administrative applications which are • Pharmacy Information Systems (PIS) are
used for processing business-related information especially designed for helping pharma-
such as purchasing orders or billing. Exemplary cists to make decisions about patient drug
instantiations are: therapies. Their emphasis lies on reducing
medical errors, improving communica-
• Clinical Information Systems (CIS) also re- tions between nurses and the pharmacy
ferred to as Hospital Information Systems department, and providing integration and
(HIS) are used to “collect, store, process, interoperability in closed-loop medication
retrieve, and communicate patient care administration (Enrado, 2005). Key fea-
and administrative information for all tures are for example prescription man-
hospital-affiliated activities and to sat- agement (e.g. matching of prescriptions
isfy the functional requirements of all au- to available pharmaceutical products),
thorized users” (van Bemmel & Musen, clinical screening (e.g. monitoring of drug
1999). They can be composed of one or a interactions and other medication-related
few software components with specialty- complications, creation of patient drug
specific extensions as well as of a large profiles), inventory management (e.g.
variety of sub-systems in medical special- control of stock), and reporting (e.g. gen-
ties (e.g. Pharmacy Information System or eration of reports concerning the medica-
Laboratory Information System). Typically, tion usage and the costs of the purchased
the Electronic Medical Record (EMR) takes drugs) (Biohealthmatics.com, 2006). Like
215
Supplier Relationship Management in Health Care
in the case of a CIS, they can be com- al., 2003). They provide all necessary func-
posed of one or a several software compo- tionalities to communicate with the admin-
nents (e.g. Computerized Physician Order istration departments of a hospital.
Entry (CPOE) or Automated Dispensing
System). caSe Study: drugS SuPPly
• Automated Dispensing Systems (ADS) management In hoSPItalS
complement CPOE in that not only the
prescription but also the administration In order to encourage the adoption of SRM ser-
of drugs is automated. Its main purpose vices in health care, it is the aim of this section to
is thus to “free up pharmacists’ time from present a case study2 that illustrates its potential
dispensing drugs by allowing drug dis- benefit. In doing so, we focus on the analysis
pensing to be done right at the point of care of selected business processes3 of drugs supply
by nurses” (Chung et al., 2003). A physical management. We are aware that a hospital has
part of ADS typically consists of cabinets to supply a wide range of products with distinct
with drawers containing medications. The relevancy for health service delivery and proximity
cabinet is equipped with guiding lights and to patients. Accordingly, approaches to procure
directs the nurse to the correct automated these products and the adoption of electronic
drawer containing the medication. services may differ (depending on its relevancy
• Unit Dose Dispensing Systems (UDDS) and proximity). However, a narrowing of the focus
are other means for automating the admin- of the case study was needed in order to analyze
istration of drugs. Whereas ADS is applied SRM adoption in more detail and to further discuss
at the point of care, UDDS are used for possible trends. Drugs supply management is a
the preparation of drugs in the pharmacy suitable example for demonstrating the usefulness
department (typically for non-fluid medi- of SRM in the area.
cines such as pills). For this purpose the
required drug doses are individually pre- case description and
pared, packaged and labeled (Swisslog, data collection
2008). Most significant advantages result-
ing from an UDDS are for example the Starting from the internal view of a hospital4, drugs
central location of drugs (the size of the supply management typically is accomplished by
ward stock is reduced), maintained drug the pharmacy department. In order to collect the
identity (each dose is identified according necessary information with respect to the adoption
to name, strength, and the patient for which of SRM in this context, three hospitals differing
it is intended), and a reduction of the prep- in terms of organization size, complexity of as-
aration time (the dose is simply removed sortment, and automation were analyzed during
from the medication cart, opened, and ad- June and August 2007. Purposive sampling was
ministered directly to the patient) (Murray chosen to select as varied cases as possible.
& Shojania, 2001). The first pharmacy, which was analyzed,
• Administrative Information Systems (AIS) corresponds to a public hospital with about 400
typically are implemented for the handling beds and a total of 55,500 patients a year. The
of admissions, discharges and transfers of hospital’s pharmacy manages an assortment of
patients, scheduling of resource plans, and almost 1,200 different pharmaceuticals (whereof
for the accounting of the services rendered 800 are in stock). The automation level of the hos-
by the procurement department (Chung et pital pharmacy is rather low compared with other
216
Supplier Relationship Management in Health Care
industries and is mainly focused on the improve- is needed in order to be able to understand, explain
ment of administrative and personnel issues of and communicate this perceived reality.
the specific organizational unit itself, thus leaving
behind potential benefits of intra-organizational understanding the regular
and inter-organizational collaboration. The second ordering routine for drugs
unit of analysis is a pharmacy of a regional hos-
pital with 48,000 patients annually, 350 beds and A key activity in drugs supply management is the
a comparable assortment of pharmaceuticals like ordering of regular pharmaceuticals, i.e. drugs
in the first case. However, as opposed to the first that are defined in a standard drugs list. As public
case, the automation is more focused on optimizing hospitals have a permanent obligation for service
not only the own organizational unit but also the delivery (also in case of crisis), only a marginal
internal interfaces (e.g. to the logistics department). fault tolerance in the procurement of these drugs
Finally, a third hospital pharmacy was analyzed, is admissible. Hence, sophisticated mechanisms
which centered their automation efforts on optimiz- to manage the entire supply chain are needed.
ing the whole supply chain (from supplier to the However, this is currently more aspiration than
patient). Interestingly, it was the smallest hospital reality (Burns, 2002). It becomes clear, when the
of these three (with 300 beds and about 31,000 flow of activities for regular ordering routines is
patients a year). As the pharmacy department is analyzed in more detail. The regular order routine
also responsible for the procurement of medical consists of ten basic activities (see Table 3).
devices, slightly more items (about 8,000) are in In Hospital A the use of ICT is focused on the
the assortment (whereof 1,000 are in stock). needs of the pharmacy staff. For this reason the
Primary means for the collecting the data were activities on the part of the nursing staff have only
expert interviews with the corresponding hospitals’ rudimentary ICT support. As the wards repository
chief pharmacists. Additionally, we used personal is not standardized and not managed electronically
observational field notes (a total of more than in a PIS, there is no inventory control (i.e. the
70 pages were generated) and secondary mate- received pharmaceuticals are not managed in the
rial (process descriptions, organizational charts, pharmacy or materials management system). Feed-
photographs) to comprise the phenomenon. To back loops that indicate that patients are given the
validate our observations, the field notes were sent right drugs are missing as no automated dispens-
to the pharmacists for revision, followed by further ing systems are implemented. In general, ICT is
meetings for in-depth discussions. only used for in-house ordering and for managing
In order to complement the internal perspec- the pharmacy inventory. Additionally, due to the
tive of single hospitals, an additional focus group manual data entry of in-house orders and of master
discussion has been conducted with suppliers in data (e.g. product and supplier information), poor
September 2007. As a result of both perspectives, data quality exists. As a further consequence of
several consolidated process models using the the localized use of ICT, important internal (e.g.
Business Process Modeling Notation (BPMN)5 to the logistics department) and external (e.g. to
were derived to document our findings (also refer the suppliers) interfaces are lacking as well. The
to Mettler & Rohner 2009a). These models are resulting media breaks give rise to more problems
helpful to understand the perceived reality, the such as missing information of order and delivery
object system, of the surveyed organizations. As status, additional labor effort for manual ordering
the interviewees perceive the health care system and lengthy process cycle times.
differently in accordance with their individual roles Although Hospital B has a comparable automa-
and objectives, an explicit form of representation tion level, the focus of ICT use lies more in the
217
Supplier Relationship Management in Health Care
218
Supplier Relationship Management in Health Care
will certainly speed up the administrative activi- pharmacists and yields to lengthy process cycle
ties of invoice verification. However, there are times, mispurchasing and so forth. However,
activities such as preparing or delivery of drugs, much more serious in this regard are medication
which are rather medical in nature and thus cannot errors, possibly caused by illegible prescriptions
be assisted by SRM services accurately.6 (Furukawa, Raghu & Spaulding, 2008). In the
United States it is assumed that medication errors
understanding the routine provoke at least one death every day and injure
for ad-hoc requests approximately 1.3 million people annually (U.S.
Food and Drug Administration, 2009). Hence,
People are becoming increasingly mobile (e.g. there is certainly room for major improvement
cross-broder commuters, tourists, seasonal work- in Switzerland, too.
ers). As a result, hospitals are faced with new chal- For the more administrative part of the ad-hoc
lenges to assure the continuity of clinical care of request routine (activities 5-8), a quite varying
their patients. In order to guarantee a permanent situation was found. When searching for an
service delivery, ad-hoc requests (i.e. booking ap- appropriate supplier, Hospital A and B spend a
pointments for pharmaceuticals, which are not in lot of time on the Internet as only the personal
the standard-drug list of the hospital) are becoming network of known suppliers is recorded in the
increasingly important. Again, ten basic activities PIS. Purchasing orders are placed by fax or by
can be differentiated (see Table 4). telephone. The status of orders and shipments
The situation in Hospital A, B, and C are prac- is therefore uncontrollable. When talking to the
tically identical for activities 1-4. All activities pharmacists of Hospital A and B, they admitted
with reference to the handling of prescriptions that this is a major problem. As the number of
are processed manually by filling out, sending, ad-hoc requests is rising, it is more and more
and processing paper-based forms. This is very difficult for them to have an accurate overview
time consuming for physicians, nursing staff, and of all pending purchasing orders.
219
Supplier Relationship Management in Health Care
220
Supplier Relationship Management in Health Care
In this chapter we therefore present the concept • laborious or precarious tasks are reduced
of SRM as socio-technical approach to enhance or at least complemented by consistency
cooperation, coordination, and communication checks (e.g. contraindication alert, out of
of procurement activities within and between stock warning, empty drip-feeding),
an organization and its suppliers. By way of a • effectiveness of the activities is enhanced
case study it was shown that hospitals are still (e.g. periodical analysis of the pharmaceu-
confronted with tical market and monitoring of the suppli-
er’s performance),
• paper shuffling (e.g. manual requisitions • non-value-adding activities are outsourced
and purchasing orders, paper-based pric- to the supplier (e.g. vendor managed in-
ing information), ventories, cross docking).
• multiple product handling activities (e.g.
two sub-processes for regular and special This will cause new technical and managerial
drugs), challanges and will require advanced knowledge
• excessive inventory carrying costs (e.g. to resolve. Hence, and building on the findings of
manual entry and update of product this chapter, future research and education needs
information), to be dedicated to deliver and teach SRM models,
• lengthy product ordering and delivery methods and instantiations for the medical and
cycle times (e.g. several process iterations non-medical work force in order to clarify the roles
when prescription is incomplete), to be adopted by the different players during the
• data quality issues (e.g. little information on implementation of supply management. Only by
product location and product utilization), these means it is possible to speed up the adoption
• process quality issues (e.g. insufficient of SRM in health care organizations.
inventory control or no existing feedback
loops that indicate if patients effectively
received the right drugs), and referenceS
• poorly developed interfaces to suppliers
(i.e. supplier is an unpredictable black Adams, M., Bates, D., Coffman, G., & Everett,
box). W. (2008). Saving lives, saving money: The im-
perative for computerized physician order entry in
On the basis of the process analysis, different Massachusetts Hospital. Retrieved February 27,
SRM services were suggested to (at least par- 2009, from http://www.nehi.net/publications/8/
tially) improve de current drawbacks. However, saving_lives_saving_money_the_imperative_for_
computerized_physician_order_entry_in_mas-
even more benefits in drugs supply management
sachusetts_hospitals
will certainly emerge through the re-design of
processes (business, management, and support) Adebanjo, D. (2003). Classifying and selecting
insofar that e-CRM applications: An analysis-based pro-
posal. Management Decision, 41(6), 570–577.
• procurement activities are consolidated doi:10.1108/00251740310491517
(e.g. a common approach for ordering of
Anderson, J. C., Hakansson, H., & Johanson, J.
pharmaceuticals and other materials), (1994). Dyadic business relationships withing a
• interfaces are optimized (e.g. integrating business network context. Journal of Marketing,
product and supplier master data), 58(4), 1–15. doi:10.2307/1251912
221
Supplier Relationship Management in Health Care
Appelfeller, W., & Buchholz, W. (2005). Supplier Bunduchi, R. (2005). Business relationships in
Relationship Management: Strategie, Organisa- internet-based electronic markets: The role of
tion und IT des modernenen Beschaffungsmanage- goodwill trust and transaction costs. Information
ments. Wiesbaden, Germany: Gabler. Systems Journal, 15(4), 321–341. doi:10.1111/
j.1365-2575.2005.00199.x
Avison, D. E., & Young, T. (2007). Time to rethink
health care and ICT? Communications of the ACM, Burns, L. R. (2002). The health care value chain:
50(6), 69–74. doi:10.1145/1247001.1247008 Producers, purchasers, and providers. San Fran-
cisco: Jossey-Bass.
Bakos, Y. J., & Brynjolfsson, E. (1993). Infor-
mation technology, incentives, and the optimal Burt, R. S. (1992). Structural holes: the social
number of suppliers. Journal of Management structure of competition. Cambridge, MA: Har-
Information Systems, 10(2), 37–53. vard University Press.
Bates, D. W., Leape, L. L., Cullen, D. J., Laird, Chung, K., Choi, Y. B., & Moon, S. (2003).
N., Petersen, L. A., & Teich, J. M. (1998). Effect Toward efficient medication error reduction:
of computerized physician order entry and a team Error-reducing information management systems.
intervention on prevention of serious medica- Journal of Medical Systems, 27(6), 553–560.
tion errors. Journal of the American Medical doi:10.1023/A:1025937916203
Association, 280(15), 1311–1316. doi:10.1001/
Craig, D. R., & Gabler, W. K. (1940). The
jama.280.15.1311
competitive struggle for market control.
Benbasat, I., Goldstein, D. K., & Mead, M. (1987). The Annals of the American Academy of
The case research strategy in studies of informa- Political and Social Science, 209, 84–107.
tion systems. MIS Quarterly, 11(3), 369–386. doi:10.1177/000271624020900112
doi:10.2307/248684
Curtis, B., Kellner, M. I., & Over, J. (1992). Process
Beuscart-Zephir, M. C., Pelayo, S., Degoulet, modeling. Communications of the ACM, 35(9),
P., Anceaux, F., Guerlinger, S., & Meaux, J. J. 75–90. doi:10.1145/130994.130998
(2004). A usability study of CPOE’s medication
Davenport, T. H., & Short, J. E. (1990). The new
administration functions: Impact on physician-
industrial engineering: Information technology
nurse cooperation. Sudies in Health Technologies
and business process redesign. Sloan Management
and Informatics, 107(2), 1018–1022.
Review, 31(4), 11–27.
Biohealthmatics.com. (2006). Pharmacy informa-
Dwyer, F. R., Schurr, P. H., & Oh, S. (1987).
tion systems. Retrieved February 27, 2009, from
Developing buyer-seller relationships. Journal of
http://www.biohealthmatics.com/technologies/
Marketing, 51(2), 11–27. doi:10.2307/1251126
his/pis.aspx
Dyché, J. (2001). The CRM Handbook: A busi-
Brennan, S. (2005). NHS IT project: The biggest
ness guide to customer relationship management.
computer programme in the world...ever! Oxford,
Reading, MA: Addison-Wesley.
UK: Radcliffe Medical Press.
Dyer, J. H., & Singh, H. (1998). The relational
Brynjolfsson, E., & Yang, S. (1996). Information
view: Cooperative strategy and sources of in-
technology and productivity: A review of the
terorganizational competitive advantage. Acad-
literature. Advances in Computers, 43, 179–214.
emy of Management Review, 23(4), 660–679.
doi:10.1016/S0065-2458(08)60644-0
doi:10.2307/259056
222
Supplier Relationship Management in Health Care
Enrado, P. (2005). Buyers guide: Pharmacy sys- Grossman, R. J. (2000). The battle to control
tems. Retrieved February 27, 2009, from http:// online purchasing. Health Forum Journal, 43(1),
www.healthcareitnews.com/story.cms?id=3786 18–21.
European Commission. (2006, October). ICT and Herzlinger, R. E. (2006). Why innovation in
e-business in hospital activities: ICT adoption health care is so hard. Harvard Business Review,
and e-business activity in 2006. Bonn, Germany: 84(5), 58–66.
eBusiness Watch.
Jutla, D., Craig, J., & Bodorik, P. (2001). Enabling
Eyholzer, K., Kuhlmann, W., & Münger, T. (2002). and measuring electronic customer relationship
Wirtschaftlichkeitsaspekte eines partnerschaftli- management readiness. Paper presented at the
chen Lieferantenmanagements. HMD - Praxis . 34th Annual Hawaii International Conference on
Wirtschaftsinformatik, 228, 66–76. System Sciences.
Fleming, R. (2004). Successful supplier relation- Koppel, R., Metlay, J. P., Cohen, A., Abaluck,
ship management. Retrieved February 27, 2009, B., Localio, A. R., & Kimmel, S. E. (2005). Role
from http://www.ameinfo.com/35411.html of computerized physician order entry systems
in facilitating medication errors. Journal of the
Freeman, L. C. (1979). Centrality in social net-
American Medical Association, 293(10), 1197–
works: Conceptual clarification. Social Networks,
1203. doi:10.1001/jama.293.10.1197
1, 215–239. doi:10.1016/0378-8733(78)90021-
7 Leftwich, L. M., Leftwich, J. A., Moore, N. Y., &
Roll, C. R. (2004). Organizational concepts for
Furukawa, M. F., Raghu, T. S., & Spaulding, T.
purchasing and supply management implementa-
J. (2008). Adoption of health information tech-
tion (No. MG-116). Santa Monica, CA: RAND
nology for medication safety in U.S. hospitals.
Corporation.
Health Affairs, 27(3), 865–875. doi:10.1377/
hlthaff.27.3.865 Leymann, F., & Altenhuber, W. (1994). Managing
business processes as an information resource.
German Association for Medical Technology.
IBM Systems Journal, 33(2), 326–348.
(2007). Elektronisches Beschaffungswesen im
Gesundheitsmarkt vor dem Durchbruch. Retrieved Marton, A., Piccinelli, G., & Turfin, C. (1999).
February 27, 2009, from http://www.bvmed.de/ Service provision and composition in virtual
themen/E-Commerce/pressemitteilung/BVMed- business communities. Paper presented at the
Umfrage_Elektronisches_Beschaffungswesen_ 18th IEEE Symposium on Reliable Distributed
im_Gesundheitsmarkt_vor_dem_Durchbruch. Systems.
html
Merriam-Webster Online Dictionary. (2009).
Glouberman, S., & Mintzberg, H. (2001). Manag- Communication. Retrieved February 27, 2009,
ing the care of health and the cure of disease - Part from http://www.merriam-webster.com/diction-
I: Differentiation . Health Care Management ary/communication
Review, 26(1), 56–69.
Mettler, T., & Rohner, P. (2008). Supplier Relation-
Granovetter, M. (1973). The strength of weak ties. ship Management im Krankenhaus. HMD - Praxis
American Journal of Sociology, 78(6), 1360–1380. der Wirtschaftsinformatik, 259, 87-95.
doi:10.1086/225469
223
Supplier Relationship Management in Health Care
Mettler, T., & Rohner, P. (2009a). E-Procurement Rainey, H. G., Backoff, R. W., & Levine, C. H.
in Hospital Pharmacies: An Exploratory Multi- (1976). Comparing public and private organi-
Case Study from Switzerland. Journal of Theoreti- zations. Public Administration Review, 36(2),
cal and Applied Electronic Commerce Research, 233–244. doi:10.2307/975145
4(1), 23–38.
Riemer, K., & Klein, S. (2002). Supplier Relation-
Mettler, T., & Rohner, P. (2009b). Increasing the ship Management. HMD - Praxis . Wirtschaftsin-
networkability of health service providers: The formatik, 228, 5–22.
case of Switzerland. Sprouts - Working Papers
Rüegg-Stürm, J. (2005). The new St. Gallen
on Information Systems, 9(1), 1-13.
management model: Basic categories of an ap-
Muessigmann, N., & Albani, A. (2006). Supplier proach to integrated management. Basingstoke,
network management: evaluating and rating of NY: Palgrave Macmillan.
strategic supply networks. Paper presented at the
SAP. (2003). What is supplier relationship man-
2006 ACM symposium on Applied computing.
agement? Retrieved February 27, 2009, from http://
Myers, M. D. (1997). Qualitative research in infor- searchsap.techtarget.com/sDefinition/0,sid21_
mation systems. MIS Quarterly, 21(1), 241–242. gci871756,00.html
doi:10.2307/249422
Schmid, B. F., & Lindenmann, M. A. (1998). Ele-
OECD. (2007). Moving up the value chain: Staying ments of a reference model for electronic markets.
competitive in the global economy. A synthesis Paper presented at the Thirty-First Annual Hawaii
report on global value chains. Pariso. International Conference on System Sciences.
Österle, H., Fleisch, E., & Alt, R. (2000). Busi- Scott, W. R. (2002). Organizations: Rational,
ness networking shaping collaboration between natural, and open systems (5 ed.). Upper Saddle
enterprises. Berlin: Springer. River, NJ: Prentice Hall.
Parente, S. T. (2000). Beyond the hype: A tax- Smith, N. (1990). The case study: A useful re-
onomy of e-health business models. Health Affairs, search method for information management.
19(6), 89–102. doi:10.1377/hlthaff.19.6.89 Journal of Information Technology, 5(3), 123–13.
doi:10.1057/jit.1990.30
Parvatiyar, A., & Sheth, N., J. (2001). Customer
relationship management: Emerging practice, Suomi, R., & Tahkapaa, J. (2002). The strategic
process, and discipline . Journal of Economic role of ICT in the competition between public and
and Social Research, 3(2), 1–34. private health care sectors in the Nordic welfare
societies-case of Finland. Paper presented at the
Porter, M. E., & Olmsted-Teisberg, E. (2004).
35th Annual Hawaii International Conference on
Redefining competition in health care. Harvard
System Sciences.
Business Review, 82(6), 64–76.
Supply Chain Management Institute. (2008). The
Post, J. E., Preston, L. E., & Sachs, S. (2002).
supply chain management processes. Retrieved
Redefining the corporation: Stakeholder ma-
February 27, 2009, from http://www.scm-institute.
mangement and organizational wealth. Stanford,
org/Our-Relationship-Based-Business-Model.
CA: Stanford University Press.
htm
224
Supplier Relationship Management in Health Care
Swisslog. (2008). Pharmacy automation system. Zeng, Y. E., Wen, H. J., & Yen, D. C. (2003).
Retrieved February 27, 2009, from http://www. Customer relationship management (CRM) in
swisslog.com/index/hcs-index/hcs-pharmacy/hcs- business-to-business (B2B) e-commerce. Infor-
pharmacycomponents.htm mation Management & Computer Security, 11(1),
The Chartered Institute of Purchasing & Supply. 39–44. doi:10.1108/09685220310463722
(2005). Selling the benefits of purchasing: Learn-
ing network publication. Retrieved February 27,
2009, from www.ifpmm.org/files/LNPubsSel- addItIonal readIng
lingBenefits.pdf
U.S. Food and Drug Administration. (2009). Banker, R. D., Kalvenes, J., & Patterson, R.
Medication errors. Retrieved February 27, 2009, A. (2000). Information technology, contract
from http://www.fda.gov/cder/handbook/mederror. completeness, and buyer-supplier relationships.
htm van Bemmel, J. H., & Musen, M. A. (1999). Paper presented at the Twenty-First International
Handbook of medical informatics. Retrieved from Conference on Information Systems.
http://www.mieur.nl/mihandbook/r_3_3/hand-
Claro, D. P. (2004). Managing business networks
book/home.htm
and buyer-supplier relationships. Wageningen,
Walston, S. L., & Chadwick, C. (2003). Perceptions The Netherlands:Wageningen University
and misperceptions of major organizational changes
Corbett, C. J., Blackburn, J. D., & Van Was-
in hospitals: Do change efforts fail because of incon-
senhove, L. N. (1999). Partnerships to improve
sistent organizational perceptions of restructuring
and reengineering? International Journal of Public supply chains . Sloan Management Review, 40(4),
Administration, 26(14), 1581–1605. doi:10.1081/ 71–82.
PAD-120024412 Herrmann, J., & Hodgson, B. (2001). SRM: Le-
Wholey, D. R., & Burns, L. R. (2003). Understand- veraging the supply base for competitive advan-
ing health care markets: Actors, products, and rela- tage. Paper presented at the SMTA International
tions. In S. S. Mick & M. E. Wyttenbach (Eds.), Conference.
Advances in Health Care Organization Theory (pp. Macbeth, D. K. (2002). Emergent strat-
99-139). San Francisco: Jossey-Bass. egy in managing cooperative supply chain
Williamson, O. E. (1979). Transaction-cost eco- change. International Journal of Operations
nomics: The governance of contractual relations. & Production Management, 22(7), 728–740.
The Journal of Law & Economics, 22(2), 233–261. doi:10.1108/01443570210433517
doi:10.1086/466942
Malone, T. W., & Crowston, K. (1994).
World Health Organization. (2005). eHealth: Re- The interdisciplinary study of coordination.
port by the Secretariat.Retrieved February 27, 2009, ACM Computing Surveys, 26(1), 87–119.
from http://www.who.int/gb/ebwha/pdf_files/ doi:10.1145/174666.174668
WHA58/A58_21-en.pdf
Mc Guire, G. A. (2006). Development of a sup-
Yilmaz, C., & Hunt, S. D. (2001). Salesperson ply chain management framework for health care
cooperation: The influence of relational, task, or- goods provided as humanitarian assistance in
ganizational, and personal factors. Journal of the complex political emergencies. Vienna, Austria:
Academy of Marketing Science, 29(4), 335–357. Vienna University of Economics and Business
doi:10.1177/03079450094207 Administration.
225
Supplier Relationship Management in Health Care
Mettler, T., & Rohner, P. (2008). Supplier rela- and sales information immediately accessible to
tionship management in healthcare practice: A all the organizations in the supply chain.
case study, Paper presented at the 6th CollECTeR Collaborative SRM: Electronic services
Iberoamerica. aiming at improving the quality of supplier com-
munication.
Ritter, T., & Gemünden, H. G. (2003). Interorga-
Communication: Exchange of information in
nizational relationships and networks: An over-
order to enhance process efficiency and to improve
view. Journal of Business Research, 56, 691–697.
the quality of a business relationship.
doi:10.1016/S0148-2963(01)00254-5
Cooperation: Forming of business relation-
Sarpola, S. J. (2007). Information systems in ships for common, usually economic, benefit.
buyer-supplier collaboration. Helsinki, Finland: Coordination: Alignment of processes and
Helsinki School of Economics. work practices in order to implement a business
relationship.
Tang, C. S. (1999). Supplier relationship
E-Collaboration: Electronic services de-
map. International Journal of Logistics:
signed to effectively facilitating collaborative
Research & Applications, 2(1), 39–56.
interactions between the buyer and the supplier
doi:10.1080/13675569908901571
such as conferencing, information sharing, project
Thompson, G., Frances, J., Levacic, R., & Mitch- management, forecasting and planning.
ell, J. (1991). Markets, hierarchies and networks: E-Contract Management: Electronic servic-
The coordination of social life. London: Sage. es designed to systematically managing contract
creating, execution, monitoring, and archiving.
Vaidya, K., Sajeev, A. S. M., & Gao, J. E-
E-Payment: Electronic services designed
procurement assimilation: an assessment of e-
to enabling the execution of online financial
business capabilities and supplier readiness in
transactions.
the Australian public sector. Paper presented at
E-Procurement: Electronic services designed
the 7th International Conference on Electronic
to facilitating purchasing and sale of supplies and
Commerce.
services through the Internet.
Veludo, M. L., Macbeth, D., & Purchase, S. (2006). E-RFx: Electronic services designed to struc-
Framework for relationships and networks. Jour- turing information requests between the buyer
nal of Business and Industrial Marketing, 21(4), and the supplier.
199–207. doi:10.1108/08858620610672560 Operational SRM: Electronic services aiming
at raising the efficiency of ordering and contract
fulfillment.
Supplier Relationship Management: Man-
Key termS and defInItIonS agement of IT-enabled supplier relationships with
the aim at enhancing the efficiency and effective-
Analytical SRM: Electronic services aiming at
ness of cooperation, coordination, and communi-
storing, analyzing, and applying knowledge about
cation between the buyer and the supplier.
suppliers and personnel dedicated to manage the
Supplier self-service: Electronic services de-
supplier’s relationship.
signed to helping suppliers to effectively manage
Business Networking: Management of IT-en-
replenishment through the Internet. Buyers take
abled relationships between internal and external
advantage of having real-time information of the
business partners with the aim at making product
supplier performance.
226
Supplier Relationship Management in Health Care
endnoteS 3
See section ‘Processes and Work Practices
for SRM’.
1
The terms Supplier Relationship Manage- 4
See section ‘Positioning of Procurement
ment (SRM) and Supply Management are within a Health Care Organization’.
used interchangeably in this chapter. 5
See ‘Additional Materials Section’.
2
In information systems research the case 6
For this, unit dose dispensing systems or
study method is a widely accepted approach automated dispensing systems can be a solu-
to investigate the development, implementa- tion; see section ‘Positioning of Procurement
tion and use of systems and services within within Health Care Organization’.
organizations (Benbasat, Goldstein & Mead,
1987; Myers, 1997; Smith, 1990).
227
Supplier Relationship Management in Health Care
aPPendIX
228
Section 5
Service Management in
Industries
230
Chapter 13
Cargo Service Dynamics and
Service-Oriented Architecture
in East Asian Airports
Joyce M.W Low
National University of Singapore, Singapore
Xue-Ming Yuan
Singapore Institute of Manufacturing Technology, Singapore
aBStract
This chapter examines the effects of primary production and key economic factors on the cargo traffic
in the East Asian airports between 1999 and 2005. Through econometric and cluster analyses, results
in this chapter found a dramatic increase in the relative importance of physical capital to human capi-
tal. More specifically, adequate provisions and utilizations of physical facilities in landside operations
appear to be more significant driving forces for an airport’s cargo traffic performances compared to
those of airside operations. In spite of the greater importance that the East Asia airport industry has
attached to cost-effective operations in the recent years, airports may no longer be able to rely on size
for a sustainable competitive edge with the reductions in the returns to scale. Meanwhile, there is still
a close direct association between a nation’s economic development and the volume of cargo traffic at
its airport.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
in a particular economy. The latter will benefit technological, organizational, financial, ecological
from additional trade gains as these companies aspects in an airport. Ohashi et al. (2005) focused
also contribute to the growth in trade volumes by primarily on air cargo transshipment airports and
replacing part of the traditional method of local examined the monetary and time cost factors.
sourcing of parts, local production, local marketing Gardiner et al. (2005) identified general factors,
and independent transportation and services with such as night curfews, freight forwarders and
global sourcing of parts, global production, global airport charges, which may exert influences on
marketing and global logistics alliances (Edger the competitiveness of the air cargo service in
1995). Meanwhile, Oum et al. (2003) noted that an airport. However, common in these studies,
air cargo service is becoming more significant to the discussions on how the landscapes of the air
an airport despite being a small business compared cargo service industry have evolved over time
with the passenger business. Worldwide average are at a minimal.
annual cargo traffic statistics shows a growth of Other studies have attempted to conduct
7.9% in freight-tonne kilometers on international longitudinal analyses on a specific airport. For
scheduled services compared to 2.1% on domestic examples, Raguraman (1997), Tsai and Su (2002),
services during the last decade (Zhang and Zhang Zhang (2003) and Lee and Yang (2003) traced
2002a). and analyzed the air hub development strategy
Ohashi et al. (2005) anticipated that the aver- pursued by the government and airport authori-
age annual air cargo growth in Asia would lead all ties in Singapore, Taiwan, Hong Kong and South
other international geographic markets in the next Korea respectively. Some of these frequently ad-
20 years, following the recovery from the 1997 opted strategies include the investing in physical
financial crisis. At the same time, liberalization and technological infrastructures, streamlining
of the airline industry has increased the freedom custom administration in their import and export
of airlines to choose where to base their domestic licensing, upgrading the skills of the workforce
hubs and inter-continent gateways and which and so forth to speed up air cargo processing
airports to use when routing their connecting procedures. Nonetheless, as airports are unique
traffic in a hub-and-spoke network. As airports to one another in terms of intrinsic characteris-
compete with one another for airlines business, tics and operating environments, it is difficult to
the ability to provide valued airport services such generalize the relative importance of the various
fast processing of aircraft, passengers, cargo and constituents in the overall development strategies
baggage become one of the most pertinent issues on airport performances from direct comparisons
in the unending quest towards competitiveness in among these case studies.
the regional market. Owing to the higher market Against this backdrop, the first objective of
concentrations1 that exist on the cargo side than on this chapter is to analyze how human and physical
the passenger side of the industry, the competition architectural aspects of an airport oriented towards
among airports for air cargo traffic is expected to the provision of air cargo service as well as the
be higher. external environment have affected the demand
Several studies in the existing literature have for the airport cargo service in East Asia between
presented a cross-sectional snapshot analysis the years 1999 and 2005. Specifically, the air cargo
across major Asian airports to assess and identify traffic is assumed to be related to primary produc-
important factors contributing to airport competi- tion factors and macroeconomic and regulatory
tiveness. Park (2003) looked at service, demand, conditions such as physical and human capital,
managerial, facility and spatial qualities, whilst national income, trade volume, customs service
Nijkamp and Yim (2001) studied the physical, efficiency and so forth through a Cobb-Douglas
231
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
function. The selection of variables included in the In brief, findings from this chapter show that
analysis is justified on the basis that the presence while conducive economic conditions continue
of key production and favorable economic factors to play a critical role in stimulating demand for
are necessary for actual traffic to materialize. That cargo service at the airports, the importance of
is, an airport must possess production factors in physical architecture has also dramatically risen
order to supply the service and favorable economic relative to human factors. Particularly, adequate
conditions allow for effective demand for the provisions and utilizations of physical facilities for
airport service. Empirical investigations (based landside operations appear to be a more significant
on observational panel data of major airports in driving force for demand of an airport’s cargo
East Asia) will provide estimates for the unknown service compared to those of airside operations.
parameters in the proposed econometric model Despite the strong emphasis on swift and reliable
and measure the validity of the model against services, cost savings are found to have regained
the behavior of the observable data. By taking a their importance in the recent years. Nevertheless,
longitudinal approach, the underlying trend on the the degree of scale returns has fallen so sharply
evolving influences of man-made and exogenous over the recent years that large airports can no
factors on cargo traffic can be uncovered. Such longer rely on size for sustainable competitive
trend analysis could provide airport operators edge. Rather, airports may need to seek more
with useful foresights for sound planning of future creative ways to control cost. One possible means
airport operations as environmental concerns, lim- is through outsourcing
ited land for expansion, shortage of skilled labor The rest of the chapter is organized as follows:
and high financing cost may result in the delay in Section 2 proposes a production model to explain
obtaining the required increase in capacity. airport cargo traffic, followed by a presentation of
The second objective is to assess to what extent empirical evidences to verify the precisions of the
different service strategies pursued by airports model using ordinary least square (OLS) regres-
have helped to drive cargo traffic under diverse sions. Section 3 benchmarks the performances of
sizes and economic conditions over the study hori- airports in terms of physical capital productivity
zon. Such assessment will aid better understanding and economic conditions and groups the airports
on the service and performance dynamics within into clusters. Section 4 discusses the findings.
the East Asia international airports industry. To Section 5 points out some potential limitations
accomplish this objective, airports are classified and concludes the study.
into clusters based on their relative efficiencies in
the use of service-oriented architectures and their
actualized traffic volumes over the study horizon. the InfluenceS of ServIce-
By adjusting for the varying baseline performances orIented archItectureS
attributable to an airport’s size and prevailing eco- and economIc factorS
nomic conditions, the cluster analysis provides a on aIr cargo traffIc
meaningful benchmarking across the airports and
measures the effectiveness of distinctive service the model
strategies adopted by major airports in the region.
Particularly, cluster movements will unveil how Airport operations are generally classified into
individual airports have transformed their strategic airside and landside. Airside operations refer to the
postures or maintained their strategic positions as activities that facilitate the movements of aircrafts
aggressors, challengers, defenders and passive including runway services, apron services, and
survivors in East Asia. the loading and unloading of baggage/ freight,
232
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
233
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
in airport i (denoted as Yi) at time t takes the fol- A linearized model of (5) can then be obtained
lowing mathematical form: by taking natural logarithms that yield
b b ln Yi (t ) = b0 + a1 ln K i (t ) + a 2 ln H i (t ) + a 3 ln X i (t ) + e 4
Yi (t ) æ K (t )ö÷ 1 æ H (t )ö÷ 2
ç i ÷ çç i ÷ b3
= e çç
b0
÷÷ ç ÷÷ X i (t ) + e1 (6)
Li (t ) çç L (t ) ÷÷ çç L (t ) ÷÷
è i ø è i ø
∀i=1,2,3 (3) This model in (6) has a potential limitation in
that it allows for little or no correlation between the
Eqn. (3) expresses the throughput per worker predictors. Correlations between predictors lead
as a function of the physical to human infrastruc- to the problem of multicollinearity, which in turn
ture ratio, the average quality of labor and an results in inflated variances and low parameters
exogenous factor. b1 and b2 represent the returns estimation precisions. Multicollinearity poses an
to scale of physical capital intensity and labor obstacle in the context of this study since K and
quality improvement on throughput per worker, L are some dimensions of airport’s capacity and
b
respectively. e 0 is the shift parameter. If b1 and hence expected to be correlated.
b2 sum to unity, the constant returns to physical
capital intensity and labor quality are implied. That empirical analysis
is, for some given economic and political condi-
tions, doubling the inputs doubles the amount of Sample and Variables
cargo that can be handled by each airport worker.
ε1 represents the random errors. The empirical analysis focuses on 14 major in-
Taking natural logarithms on both sides of ternational airports across East Asia, selected on
(3), basis of data availability in the annual Airport
Benchmarking Report (2002-2007 issues). Air-
æ Y (t ) ö÷
ç i ÷
æ K (t )ö÷
ç i ÷
æ H (t )ö÷
ç i ÷
ports from the Northeast Asia region comprise
ln çç ÷÷ = b0 + b1 ln çç ÷÷ + b2 ln çç ÷ + b3 ln X i (t ) + e 2 Chek Lap Kok (Hong Kong), Seoul Gimpo (South
çç L (t )÷÷ çç L (t ) ÷÷ çç L (t ) ÷÷÷
è i ø è i ø è i ø
∀i=1,2,3 (4) Korea) Incheon (South Korea), Narita (Japan),
Kansai (Japan), Beijing Capital (China), Shanghai
The use of such log functions, as in (4), allows (China), Chiang Kai Shek (Taiwan) and Macau
for modeling of nonlinear relationships between while airports from the Southeast Asia region are
input factors and estimations of parameters by Changi (Singapore), Kuala Lumpur (Malaysia),
means of multiple linear regressions. Bangkok (Thailand), Ninoy Aquino (Philippines)
Other special variations of the model are pos- and Soekarno-Hatta (Indonesia).
sible but with certain limitations. For example, The total capacity of physical infrastructure
the cargo traffic of airport i can be expressed as a of airport i, Ki, is represented by the number of
Cobb-Douglas function of physical capital, labor runways6 in the airside operations and the total area
services and economic conditions as follows: of terminals7 in the corresponding landside opera-
tions. As both types of operations are indispensible
a1 a2 a3 in the provision of air cargo service, equal weights
Yi (t ) = e 0 K i (t ) H i (t ) X i (t ) + e3
b
are attached to runways and terminal areas in the
0<ai<1;∀i=1,2,3 (5) computation of Ki. The amount of human service-
oriented architecture in airport i is measured by
234
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
the number of employees Li who work directly egory is given the highest score of 10 points and
for the airport operator. Li is supplemented with the score for other airports are computed based on
information on its quality Gi(E), which estimated their performances relative to the top performing
by the average level of economic literacy8 in airport in the sample. When normalizing these
the economy on the assumption that an average data, some prudence needs to be exercised to
worker’s education at the country and airport lev- maintain a meaningful scoring scheme. For air-
els are the same. Although in practice it is by no port capacity and economic measurements like
means a standard assumption that human capital GDP or trade volume, it is straightforward that
only depends on years of education since many airports are scored relative to the airport with the
studies in labor economics would suggest work most runways or largest terminal area and nation
experience as another important factor. Without with the highest GDP or trade volume. However,
concrete worker turnover data, the average years for dimensions like political and economic risk,
of education present itself as a good surrogate nations with the lowest level of risk will be given
because it represents the general level of quality the highest score of 10 and other nations are scored
of the workforce available for hired on a national against the benchmark set by the best performing
basis. Unless there is a strong evidence to sug- nation. In this way, the offsetting effects among
gest that there is a bias in employing worker of economic variables like high GDP versus high
higher/lower education qualification in the airport economic risk can be prevented. Such scoring
industry, far short of conducting a detailed survey, system, while retaining the original distribution
using the national average level of economic lit- of the data, also permits the modeling of relation-
eracy is not unreasonable.Hi is, hence, obtained ship between cargo traffic and other performance
as a product of Li and Gi(E) as in Eqn. (1). indicators relative to the industry best practice.
The exogenous variable Xi is made up of five in-
dividual economic variables components, namely, Results
GDP, trade volumes, custom service efficiency
and political and economic risk ratings. These Separate cross-sectional multiple-regressions are
economic-related data are obtained from the World run to estimate the values of parameter coefficients
Competitiveness Yearbook (2001 – 2006 issues). in (4) that will provide a best fitting model (i.e.,
GDP and trade volume are measured in current US Model 1, 2, 3 and 4) for each of the alternate years
dollars while custom efficiency and risk ratings are between 1999 and 2005 inclusive. That is, all the
given as perceived ratings by businesses obtained four regression models11 take the form:
through extensive surveys. For simplicity, GDP
per capita is used despite the fact that the effective æ Y ö÷ æ K ö÷ æ H ö÷
ln ççç i ÷÷ = b0 + b1 ln ççç i ÷÷ + b2 ln ççç i ÷÷ + b3 ln X i + e 2
demand for air services in the domestic market9 is ÷
çè Li ø ÷
çè Li ø çè Li ÷ø
also influenced by the income distribution in the
nation and airport traffic is often affected by GDP The results obtained from ordinary least square
of more than one country. The latter is partially (OLS) estimates are given in Table 1 below. Apart
circumvented through the incorporation of trade from the constants, the coefficient estimates that
volume that reflects the economic conditions of are statistically significant at a 95 percent signifi-
international trading partners. cance level are ln Xi in models 1, 2 and 4 and ln(Ki
As variables are measured in different units, /Li) in the models 3 and 4. Whereas at a 90 percent
the raw data are normalized10 before feeding them significance level, lnXi is significant in all the four
into the model of analysis. Normalizing is done models, ln(Ki /Li) is significant in models 2, 3 and
such that the best performing airport in the cat-
235
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
4 and ln(Hi /Li) is significant only in model 2. It Factor (VIF) are computed. The tolerances for
can be inferred that the physical capital intensity all variables are above 0.10, which corresponds
and nation’s aggregate economic performances, to VIF values below 10. Additional diagnostic
but not labor quality, have a significant impact on measures of multicollinearity are Condition Index
labor productivity with physical capital intensity and Variance Proportions. No multicollinearity
assuming higher importance in the more recent problem is indicated since all condition indexes
years. These regression models have high predic- are less than 30 (see Table 4 in Appendix A). As
tive accuracy between 83.44 to 92.26 percent. an overall check for multicollinearity, the study
The accompanying residual plots attached in examines the model fits of the reduced regression
Figure 9,Figure 10,Figure 11and Figure 12 in models in which the non-significant parameters
Appendix A show that errors are normally dis- are removed. The absence of multi-collinearity is
tributed with constant variances and there is no confirmed in Table 2, since all values of adjusted
apparent outlier in the sample of airports. Several R-square remain very stable.
tests are employed to check for multicollinearity The original regression models can be rewritten
which may lead to misleading model results. In to gain better insights as below.
all the four models, the signs of parameters are
examined and found to turn out as expected.
ln Yi - ln Li = b0 + b1 (ln K i - ln Li ) + b2 (ln H i - ln Li ) + b3 ln X i + e 2
t tests confirm that the coefficients of at least
one (out of the three parameters) other than the
intercept are statistically significant at 95 percent
confidence level and F test for the overall model which simplifies to
adequacy are also significant. Noting that many ln Yi = b0 + b1 ln K i +(1 - b1 - b2 ) ln Li + b2 ln H i + b3 ln X i + e 2
data sets with significant multicollinearity may not Recalling that Hi =LiGi,
exhibit the patterns of wrong signs and insignifi- ln Yi = b0 + b1 ln K i +(1 - b1 ) ln Li + b2 ln Gi + b3 ln X i + e 2
cant t-tests, the Tolerance and Variance Inflation The coefficient estimates in the log-linear re-
236
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
gression function above measure the percentage other words, for an airport with one unit of physi-
change in Yi associated with one percentage change cal capital, labor and economic rating, the volume
in the respective parameters, holding the other of airfreight handled increases from 47806 and
parameters constant. Specifically,bi, 1−b1,b2 and 62975 metric tons. The contribution of physical
b3 gives the percentage change in cargo through- infrastructure to cargo traffic increases dramati-
put for a one-percent change in Ki, Li, Gi and Xi cally from 0.0714% increase in Yi for a 1% in-
respectively. Table 3 summarizes the change in crease in Ki in 1999 to 0.8299% in 2005. On the
the relative contributions of these various factors contrary, human architecture (i.e., size and skills
to cargo traffic volume. of workforce) gives decreasing returns throughout
Table 3 shows that the constant term increases the study horizon. The aggregate economic per-
from 10.7749 to 11.0505 over the six years. In formance of a nation impacts the performances of
Table 3. Influences of physical and human service-oriented architectures on air cargo traffic, 1999 -
2005
237
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
its airport most significantly, averaging 0.8325 for from the economic volume and standard capital
the six years. The overall returns to scale for the productivity. Airports of particular interest will,
total airport development effort are derived from therefore, be those airports falling into one of the
a summation of the rates of returns for physical four clusters:
facilities investment, labor force expansion and
labor quality improvement. 1. Aggressor
Nonetheless, capital investment in publicly-
owned airports could be positively related to the Aggressor airports invest significantly in their
country’s GDP and trade volume. In the case of physical infrastructure and facilities. To some
private airports, political and economic risks might extent, these investments have helped the airports
discourage foreign direct investment (FDI) and to achieve the volume above what they could oth-
exert an adverse impact on capital investments in erwise achieve given the economic and political
airport infrastructure since unstable political and conditions in their operating environments. The
economic situations will hamper the realization of low physical capital productivity of the airports
long-term investments. The next section presents is a deliberate result from the aggressiveness of
a cluster analysis to classify airports according to these airports to fight for more traffic volume in the
their airside and landside capital investments, as near future. Other reasons for their extraordinary
well as, traffic performances, in view of the differ- achievements can be accredited to their superior
ences in their political and economic conditions. geographical locations, natural airport attributes,
A close scrutiny of airport movements among good management practices etc.
the clusters will unveil the dynamics within the
airport industry and provide a better understand- 2. Defender
ing on the effectiveness of the various strategies
undertaken by individual airports. Defender airports are equipped with physical
infrastructure and facilities above the required
level for their existing volumes. While one pos-
cargo ServIce dynamIcS sible rationale for keeping excess facilities is
In eaSt aSIan aIrPortS to protect market shares, it is also apparent that
such investments have limited success in attract-
This section explores the cargo service dynamics ing greater volume. Relative to the competition,
within the East Asia airport industry via cluster airports in this category may be perceived to be
analysis. A two-step procedure is used to obtain the less attractive by users for other reasons (such as
airport clusters. In step one, the standard capital inferior geographical location, lack of support-
productivity (for an airport of a given volume) ing infrastructure, restrictive open sky policies,
is determined from a trend line fitted using OLS unfavorable service-cost ratio and so forth). As
estimate in the graph with Capital Productivity12 a result, defender airports suffer concurrent low
plotted against Cargo Volume. Similarly, the capital productivity and cargo volume.
economic volume (that an airport is expected
to achieve given her nation’s economic perfor- 3. Challenger
mances) is determined from the trend line fitted
in the graph with axes Cargo Volume and Nation’s Challenger airports are promising airports that
Economic Performances. In step two, airports are have shown exceptionally good performances.
classified into clusters according to their exhibited At the same time, the high physical capital pro-
traffic volume and capital productivity deviations ductivity of these airports implies good asset
238
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
Figure 1. Airport Clusters – Airside Operations Figure 2. Airport Clusters – Airside Operations
in 1999 in 2001
Figure 3. Airport Clusters – Airside Operations Figure 4. Airport Clusters – Airside Operations
in 2003 (the balancing partition coincides with in 2005 (the balancing partition coincides with
the horizontal axis) the horizontal axis)
239
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
Being the major airport for the capital city 2000s. By 2005, this airport has achieved an im-
of Japan, Narita airport is a challenger to other pressive traffic that gives it a runway productivity
Asian airports in 1999 and 2001. The additional significantly above the standard productivity and
of a new runway after 2001 moves the airport into hence a challenger airport status. On the other
the cluster of aggressors in 2003. Perhaps, owing hand, defender Macau airport becomes a passive
to lag effect of capacity investment on airlines survivor due to the slower development of its air
demands, the airport returns to the status of a logistics industry relative to other parts of East
challenger with slight increases in traffic in 2005. Asia that places less emphasis on the airport’s role
The second largest Japanese airport, Kansai, is a as an air cargo hub. In Taiwan, Chiang Kai Shek
passive survivor throughout the study horizon. airport has added a new runway after 1999. The
With a higher runway productivity and lower cargo provision of an additional runway, among other
volume than the industry norm, this could be a government initiatives and incentives, stimulates
sign that airside congestion is hindering further an obvious increase in traffic in Chiang Kai Shek
development of the airport. airport. The airport progresses to an aggressor
Incheon airport has its beginnings as an ag- status rather than a mere defender in the subse-
gressor owing to the South Korea’s government quent years.
plan to develop the country into a regional air
hub. Despite the enormous investments in capac- 2. Southeast Asia:
ity, the spectacular traffic growth of the airport
exceeds capacity and Incheon airport becomes Throughout 1999 to 2005, Changi and Kuala
a challenger exhibiting relatively high runway Lumpur airports are defenders and Bangkok air-
productivity in 2005. Meanwhile, Seoul Gimpo port is an aggressor. Ninoy Aquino and Jarkarta
airport transforms from an aggressor to a defender Soekarno Hatta airports are on the boundary
as more of its traffic is being channeled to the new between aggressor and defender, implying low
Incheon airport. runway productivity and traffic quite on par with
Situated in the capital city of China in northern economic volume. These findings are congruent
China, it is unsurprising that Beijing Capital airport with expectation, considering that they are major
maintains large capacity even though this may not airports for their respective country and the provi-
lead to significant cargo traffic improvements. As sion of adequate capacity is indispensable regard-
such, the cluster analysis results show negligible less of traffic or capacity utilization levels.
movement in position of Beijing Capital airport as
a defender. In recent years, eastern China experi- landside operations
ences a soaring escalation of the manufacturing
investments. Shanghai Pudong airport, in the Figure 5, Figure 6, Figure 7andFigure 8 show
southeast part of China, has achieved remarkable that almost all airports lie near the vertical axis
growth especially between 2001 and 2003 when in 1999. However, the alignment is broken in the
the airport officially takes over most of the inter- latter years. Particularly, the balancing partition
national traffic from under-capacitated Shanghai in the capital productivity-traffic grid is a nega-
Hongqiao airport. Shanghai Pudong airport will tively sloped dash line in 2003. As the partition
take on the status of an aggressive player as more transforms into a positive slope in 2005, it may
investment is pumped into the airport. be inferred that cost is gaining importance in the
At the Southern part of China, Chek Lap Kok recent years.
airport in Hong Kong is an aggressor in the early
240
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
Figure 5. Airport Clusters – Landside Operations Figure 7. Airport Clusters – Landside Operations
in 1999 (the balancing partition coincides with in 2003
the horizontal axis)
Figure 6. Airport Clusters – Landside Operations Figure 8. Airport Clusters – Landside Operations
in 2001 (the balancing partition coincides with in 2005
the horizontal axis)
241
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
Beijing Capital and Shanghai Hongqiao air- is not a cause of underperformance for defender
ports in the mainland China exhibit some signs airports like Kuala Lumpur and Jarkarta Soekarno
of landside congestions. For Beijing Capital air- Hatta airports, which experience concurrent low
port, a reduction of terminal area productivity in terminal area productivity and traffic volume.
2003 has enabled the defender airport to achieve
its economic volume but an increase in terminal
area productivity in 2005 gives an opposite effect. dIScuSSIonS
Likewise, Shanghai Hongqiao airport exhibits
high terminal productivity but low traffic as a The volume of airfreight handled by an average
passive survivor in 2001. After the diversion of East Asian airport has increased significantly
international traffic from Shanghai Hongqiao over the six years. Alongside, the rising signifi-
airport to the larger Shanghai Pudong airport in cance of physical architecture on airport cargo
2001, concurrent increases in volume and terminal traffic is compatible with the ever-increasing
productivity move the defender Shanghai Pudong airline expectations for efficient services in that
airport swiftly to the cluster of challengers in 2003. an adequate provision of physical facilities rela-
Growth in traffic and terminal area productivity tive to the cargo volume handled enables timely
perpetuate into 2005 and Shanghai Pudong airport processing of cargo. The capacity constraints at
continues to grow as a challenger. Asian airports are well documented in the litera-
Chek Lap Kok airport is an extraordinary ture (for examples, Meredith 1995; Dempsy and
performer. While being an aggressor in the late O’Conner 1997). In particular, Hufbauer et al.
1990s, the airport has become a challenger since (1995) witnessed the acute competitions between
the turn of the decade with impressive perfor- US and Asian carriers for slots at Narita airport
mances in traffic and capital utilization. Chiang due to congestions. This adverse impact of con-
Kai Shek airport progresses from a defender to gestion on service quality to airlines becomes
an aggressor to a challenger as traffic volume more severe in the late 1990s when the increase
gradually improves over the years. The airport in physical infrastructure cannot keep pace with
returns to the cluster of aggressors as additions to the increasing cargo and passengers traffic.
terminal area after 2003 ease congestion and bring In contrast, the returns from labor show declin-
along higher traffic. Macau airport also exhibits ing trends which may be attributable to the greater
some signs of landside congestions as a passive automations that reduce the airports’ reliance on
survivor. This congestion problem is evident from manual labor. Prior to the shift towards automa-
the observation that an increase in terminal area tion, airports like Narita and Changi that are
productivity between 2003 and 2005 has brought operating under cost escalations have attempted
along some reductions in traffic volume. to control their cost by hiring cheaper labor from
Thailand, Philippines and India. As operating cost
2. Southeast Asia continues to increase, these airports resort to more
extensive automations made possible through
Changi airport’s terminal area productivity technological advancements and airport users’
falls gradually from 1999 to 2005 while its traffic acceptances. Hence, the size and productivity of
volume fluctuates around the economic volume. In the workforce (i.e., human architecture) cease to
Thailand, Bangkok airport experiences dramatic play a determining role in ensuring the smooth
changes in strategic postures and performances operations of an airport and contribute less to the
that also show no apparent relationship to terminal service quality to airport users than before. Fur-
area productivity. Similarly, landside congestion thermore, the diminishing returns to scale for the
242
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
general effort towards rapid and reliable airport the capacity of attracting FDI and a relevant role
services may also indicate the increasing ease of in the determination of the capital investments in
newly developed and smaller airports to catch private airport infrastructure as unstable political
up with the more established and bigger ones as situations will hamper the realization of long-term
size of operations (leading to cost efficiency and investments.
throughput volume generation) is less of a hurdle On observation of the potent effects of the
to overcome now. physical architecture of an airport on air cargo
Unsurprisingly, the economic and political traffic, a cluster analysis is carried out to further
environment in which an airport is operating distinguish between the influences of airside
within notably affects the demand and supply of and landside facilities. After adjusting for differ-
air cargo services at the airport. Higher income and ences in airport size and economic conditions, it
quick custom clearance boost the demand for air is found that high (low) runway productivity is
cargo services since air cargo generally comprises associated with low (high) cargo traffic in 1999
high value and/or time sensitive products. Other and 2001. This implies that airside congestion
contributing factors include shortening product may be hindering potential demand for air cargo
lifespan, increasing JIT adoption and lowering service. In response, Chiang Kai Shek and Narita
airfreight rates that prompted shippers to move airports have added new runways while China and
from the use of sea transport to air transport on South Korea re-divert their traffic from Shanghai
condition that there will be greater demand for Hongqiao and Seoul Gimpo airports to Shanghai
higher value and more rapidly launched new Pudong and Incheon airports respectively. Despite
products. Furthermore, the recent development the fact that almost all airports achieved “industry
of a new airport or the upgrading of an existing standard” for runway productivity in 2003 and
airport to handle higher traffic requires airports 2005, traffic still differ significantly among the
to possess the ability to address a whole dimen- airports. Therefore, it is reasonable to believe that
sion of security threats identified following the other factors beyond adequate runway provision
911 events and the provision of facilities so as and aggregate economic circumstances play a
to deliver better service and performance with greater role in driving demand of air cargo ser-
the arrival of the new age of mega aircraft in the vice. In comparison, airports’ landside operations
mode of the A380s and the Boeing Dream Liner. exhibited an interesting relationship between the
With designs relating to runway and vehicular provision of facilities and cargo traffic in years
approaches to the airport, the circulation and 2001 through 2005. In 2001 and 2003, airports
layouts of terminal buildings, contact gate facility that plan for extra capacity attract more traffic.
and the introduction of new security and baggage Adequate provisions of facilities, though lowering
handling systems and processes to be factored the utilization of such facilities, ensure that cargo
into the construction and development of airports, will be able to flow smoothly and in a more-timely
the associated enormous outlay14 has transformed manner without incurring unnecessary waiting
into a whole complexion of airport development time for loading and unloading. However, the
financing. This leads to a surge in airport priva- reverse is observed in 2005. High utilization
tization programs and the use of public-private of physical landside capacity is associated with
partnerships in the financing landscape of airport high air cargo traffic. Since high productivity (or
developments. Therefore, while it is probable for utilization) is achieved when a large cargo vol-
capital investment in publicly-owned airports to ume is spread over the given capacity, it may be
be related to the country’s economic conditions, inferred that cost savings has become more critical
it is also clear that political instability might have under the intensifying competitive pressure and
243
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
the narrowing profit margins in the downstream Overall, the scale returns for the operations of air
cargo service industry of the airlines. Hence, it cargo services in the East Asian airport industry
may be desirable for airports like Kuala Lumpur, have fallen prominently. Two profound implica-
Jarkarta and Changi to reduce terminal capacity tions, especially for established airports, can be
to lower their overheads as well as the associated inferred from these results. First, smaller airports
variable costs. are more likely to be able achieve cost efficiency
comparable to their bigger counter parts. Second,
airports will need to seek more creative ways to
concluSIon control cost as this study also envisages that cost
savings has become more critical with increasing
This chapter explores the contributions of physi- competitive pressure. One possible means for
cal and human service-oriented architectures as cost control is through outsourcing of peripheral
well as the economic and political environment services to specialized third parties.
to the cargo traffic in airports across East Asia. Admittedly, this study is not without its
Through a cluster analysis, the chapter further shortcomings. Apart from the physical and hu-
investigates the strategic postures exhibited by man service-oriented architectures present in an
major East Asian airports and industry competi- airport, it should be recognized that the quality
tion dynamics between 1999 and 2005. of airport’s cargo service is influenced by the
In summary, findings from this chapter have availability of intermodal transfer facilities and
shown that an average airport in the East Asia technological infrastructure. Intermodal (or
airport industry handles more traffic than before. surface) accessibility that provides links to and
While favorable economic condition is a major from the airports will ensure rapid and efficient
cause for the higher traffic, political stability has movement of goods in a door-to-door delivery
also become one of the critical factors following the (Meredith 1995; Zhang 2003; Lee and Yang 2003).
emergence of infrastructure funds from the private Similarly, technological infrastructures such as
sector. At the same time, the increasing returns supporting information systems simplify custom
from physical capital investment are reasonable procedures by computerizing shipment informa-
since runway and terminal capacity shortages tion and enhance efficiency of airports by allowing
have negative effects on the quality of services to pre-clearance of shipments (Ohashi et al. 2005).
airport users in terms of delays and inconvenience. Furthermore, using quantity and quality of labor
Between airside capacity and landside capacity, the as the sole quantification of human architecture
provisions and utilizations of physical facilities for may be misleading due to the varying degrees
landside operations seem to be more important in of outsourcing practices at different airports, as
driving an airport’s cargo traffic in recent years. well as, the fact that the responsibilities of airport
Jorge and Rus (2004) reflected these findings when operators and range of services provided vary
they opinioned that it is the terminal capacity that greatly among the airports (Low and Tang 2006;
determines potential output and airside capacity Lam et al. 2009). With regard to the latter, future
matters little in comparison since cargo flights studies that consider the influences of economies of
can operate during off-peak periods. On the other scope (services diversification strategy) on airport
hand, the returns from labor expansion and labor competitiveness and the associated implications
skills upgrading have fallen over the years. A pos- on smaller airports would be meaningful.
sible explanation is that extensive automations of
custom clearances, baggage checks procedures and
so on, have reduced the reliance on manual labor.
244
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
245
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
Ohashi, H., Kim, T. S., Oum, T. H., & Yu, C. (2005). Yoshida, Y., & Fujimoto, H. (2004). Japanese-
Choice of Air Cargo Transshipment Airport – An Airport Benchmarking with the DEA and
Application to Air Cargo Traffic to/ from Northeast Endogenous-Weight TFP Methods: Testing the
Asia. Journal of Air Transport Management, 11, Criticism of Overinvestment in Japanese Regional
149–159. doi:10.1016/j.jairtraman.2004.08.004 Airports. Transportation Research Part E, Lo-
gistics and Transportation Review, 40, 533–546.
Oum, T. H., Yu, C., & Fu, X. (2003). A Com-
doi:10.1016/j.tre.2004.08.003
parative Analysis of Productivity Performance
of the World’s Major Airports: A Summary Re- Yung, Y. H., Chang, C. P., & Hsien, M. C. (2008).
port of the ATRS Global Airport Benchmarking Air Cargo as an Impetus Economic Growth
Research Report 2002. Journal of Air Transport through the Channel of Openness: the Case of
Management, 9, 285–297. doi:10.1016/S0969- OECD Countries. International Journal of Trans-
6997(03)00037-1 port Economics, 35(1), 31–44.
Park, Y. (2003). An Analysis for the Competitive Zhang, A. M. (2002). Electronic Technology
Strength of Asian Major Airports. Journal of Air and Simplification of Customs Regulations and
Transport Management, 9, 353–360. doi:10.1016/ Procedures in Air Cargo Trade. Journal of Air
S0969-6997(03)00041-3 Transportation, 7, 87–102.
Quilty, S. (2003). Achieving Recognition as a Zhang, A. M. (2003). Analysis of an International
World Class Airport through Education and Train- Air Cargo Hub: the Case of Hong Kong. Jour-
ing. Journal of Air Transportation, 8, 3–14. nal of Air Transport Management, 9, 123–138.
doi:10.1016/S0969-6997(02)00066-2
Raguraman, K. (1997). International Air Cargo
Hubbing: The Case of Singapore. Asia Pacific Zhang, A. M., & Zhang, Y. M. (2002a). Issues
Viewpoint, 38(1), 55–74. doi:10.1111/1467- on Liberalization of Air Cargo Services in In-
8373.00028 ternational Aviation. Journal of Air Transport
Management, 8, 275–287. doi:10.1016/S0969-
Romer, D. (2001). Advanced Macroeconomics.
6997(02)00008-X
2nd Edition, New York: McGraw-Hill.
Zhang, A. M., & Zhang, Y. M. (2002b). A Model
Taneja, N. K. (2002). Driving Airline Business
of Air Cargo Liberalization: Passengers vs. All-
Strategies through Emerging Technology, Ash-
Cargo Carriers. Transportation Research Part
gate, UK:Aldershot.
E, Logistics and Transportation Review, 38,
Tsai, M. C., & Su, Y. S. (2002). Political Risk As- 175–191. doi:10.1016/S1366-5545(02)00004-2
sessment on Air Logistics Hub Developments in
Taiwan. Journal of Air Transport Management, 8,
373–380. doi:10.1016/S0969-6997(02)00016-9
endnoteS
World Competitiveness Yearbook (2001-2004).
World Competitiveness Yearbook. Lausanne,
1
Taneja (2002) noted that the top ten cargo
Switzerland: International Institute for Manage- hubs account for around two-thirds of cargo
ment Development movements; whereas the top ten passenger
hubs account for only one-third of passen-
gers. Holloway (2003) advocated that the
growth of focused cargo alliances is likely
to add further momentum to this pattern of
concentration.
246
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
2
Gillen and Lall (1997) articulated that ef- 6
According to the Air Transport Research
ficiency of an airport will suffer when there Society, the number of runways indicates
is a slowdown in the economy regardless of the airside capacity of an airport. Other than
airport management ability or effort. It is the absolute number, the length and crossing
reasonable that wealthier nations will enjoy of runways are other important aspects that
higher human traffic volumes which trigger limit flight operations. Ohashi et al. (2005)
more flights to be scheduled to meet the de- stated a minimum length of 2800 is required
mand. In turn, this increase in the number of to accommodate the Boeing 747 – 400.
flights will not only reduce connecting time Hence, the study also checks that all airports
for human traffic but also that of transship- in our sample have at least one runway that
ment cargo due to the use of combination is longer than 2800 meters and there is no
flights that carry both passengers and cargo. intersection of runways.
The shorter connecting time will enhance the 7
Yoshida and Fujimoto (2004) advocated
attractiveness of an airport as an air cargo that the size of the terminal determines the
hub. airport’s ability to load passengers and cargo
3
The trend towards more expensive aircrafts into aircrafts and hence plays an important
adds pressure to a terminal, making aircraft role in airport operation activity. Consider-
depreciations high, and aircraft utilizations ing that a significant percentage of the cargo
and turnaround time critical. Cargo whether volume is transported in combination flights
on a freighter or combination flight must be that carry both passengers and cargo, this
unloaded rapidly when a flight arrives, and study thus uses total terminal area as a proxy
outgoing traffic must be ready for quick to the amount of physical capital used in an
loading. Associated with the turnaround time airport.
is the paperwork that is required. O’Conner 8
The World Competitiveness Yearbooks ob-
(1995) noted that one of the greatest delays tained ratings on economic literacy through
in international air cargo is the awaiting extensive surveys. The ratings reflect the
of customs clearance. Kasarda and Green general perceptions of the quality and pro-
(2005) highlighted that 20% of the goods ductivity of a workforce through education
transit time and 25% of costs are spent in by businesses.
customs clearance. Ohashi et al. (2005) 9
Chin (1997) advocated that a strong domestic
added that delays in customs clearance market can command a certain level of air
procedure disrupt efficient logistics flows, services.
and thus hinder the hub development in air 10
In Sarkis (2000), normalizing is done by
cargo transport. dividing each value of a respective airport
4
Tsai and Su (2002) remarked that air hub de- for a given factor by the mean value of all
velopments are closely related to government airports for that respective input or output
performances, and political or economic risk factor. Such mean normalization lessens the
is important in determining the success of impact of large difference in data magnitude,
such developments. while preserving the underlying distribution
5
According to Ohashi et al. (2005) and others, of the data.
traffic volume is commonly used as a per- 11
An attempt to fit the parameter values, in
formance measure in the airport literature on Eqn. (6), has resulted in adjusted R-square
the assumption that airports are throughput values as low as 6 percent and wrong coef-
maximizers. ficient signs. As Yoshida (2004) observed
247
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
248
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
aPPendIX a
Figure 11. Residual Plots of Errors against ln Figure 12. Residual Plots of Errors against ln
(Yi/Li) of 2003 (Yi/Li) of 2005
249
Cargo Service Dynamics and Service-Oriented Architecture in East Asian Airports
250
251
Chapter 14
Lifecycle Management of
SLAs for Service Enterprises
Yang Li
Applications & Services, Research & Technology, British Telecom, UK
aBStract
Service level agreement (SLA) is becoming an increasingly sought-after topic in recent years, as complex
logistics and service chains span across geographical boundaries in the lights of globalization and new
technological developments. This chapter introduces the reader to the state of the art lifecycle manage-
ment of SLA for service enterprises, which covers stages of terms optimization, contract drafting and
compliance tracking. In particular, the author identified deficiencies in the area of term optimization and
outlines several R&D tracks that would lead to the development of industry-strength SLA optimization
capabilities. An initial version of a SLA optimization toolset coded-named SLA-OASIS is reported, in
the context of a telecom service, to illustrate such a concept. In addition, some out-of-box toolsets for
drafting SLA contracts and tracking SLA compliance are also reviewed.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Lifecycle Management of SLAs for Service Enterprises
During 1980s, there were a wave of privatiza- offer the functionalities of SLA tracking
tions in the service sector that liberated service and reporting (NimBUS, 2007).
markets and called for regulations to protect the
interests of service consumers and providers Drafting SLA contracts and tracking their
alike. Companies chose SLAs as legal means compliance both occur after term negotiation.
to handle relationships with their customers. In During the SLA negotiations, either with regula-
recent years, the tide of globalization further tors or service customers, it is crucial for service
highlighted the needs of service standardization, as providers to see the direct impact of proposed SLA
complex logistics and service chains emerged and terms on their level of profitability, such that they
spanned across country borders, which requires can have reasoned and informed decision makings.
stricter legislation and enforcement on quality To our knowledge, there is no commercial tool in
of services. European Committee, for instance, the market that can check levels of profitability
has set up initiatives on service standardization for any specified SLAs.
that takes effect in December 2009 (European This chapter will walk the reader through state
Committee, 2007). of the art of SLA lifecycle. To remain focused and
A full SLA management cycle consists of the generic, the discussions will have to be limited to
following activities: terms negotiation and opti- a set of key SLA and operation parameters. The
mization, contract drafting, compliance tracking author will explore some work related to SLA
and reporting: optimization and outline some R&D tracks that
help build industry-strength SLA optimization
• Terms negotiation and optimization. For capabilities. An initial version of SLA optimization
large service enterprises, by regulations, toolkit code-named SLA-OASIS, will be reported,
uniform SLAs are often provided to ser- in the context of a telecom service. Furthermore,
vice customers to guarantee equivalence some typical out-of-box tools that are applicable
of services; for small and medium service to certain activities, such as contract drafting and
providers, SLAs are often established via compliance tracking will also be reviewed.
negotiations between service providers The remaining of the chapter will be organized
and service consumers. as follows. Section 2 defines a set of key SLA and
• Contract drafting. To produce an appropri- operation parameters; Section 3 discusses SLA
ate and focused SLA requires non-trivial le- terms negotiation and computer-assisted opti-
gal knowledge and efforts. There are some mization; Section 4 covers template-based SLA
tools in the market that were designed to contract drafting; Section 5 reviews automated
make the creation of SLA contracts more SLA compliance tracking and reporting. Finally,
straightforward, which is often achieved Section 6 concludes.
via a collection of templates that facilitate
contract drafting in a formal way (SLA-
World, 2002). Sla and oPeratIon ParameterS
• Compliance tracking and reporting. Once
SLAs are created, it is important that such Generally speaking, a service enterprise can be
SLAs are kept being monitored to ensure considered as an entity that offers and fulfills a
its compliance. Industry practice showed set of services. Each service is composed of the
that active monitoring of SLAs can typical- following elements: a set of service level agree-
ly save 5 to 10% of annual service contract ments, a business process, an enterprise resource
costs. There are some commercial tools to plan and a business model. In this section, we use
252
Lifecycle Management of SLAs for Service Enterprises
telecom services as examples to illustrate these orders that are associated with a specific service
concepts. level agreement; it tells the volumes of service
order arrivals on each calendar day, which usually
Service level agreement follows a normal distribution around an expected,
average order volume.
In its basic form, a service level agreement contains In practice, service enterprises tend to adopt a
minimum lead time, standard lead time, pricing, single service level agreement that has one priced
delay penalty and associated customer demand. standard lead time. Alternatively, they can adopt
Minimum lead time, as its name suggested, is multiple service level agreements, each having its
the minimum time the customer has to wait for own service lead time and price, as well as delay
before receiving service; this is often determined penalty and demand. Table 1 and Table 2 illustrate
by the nature of a service, e.g., equipments have such two scenarios. Some notations are:
to be put in place before a service can be started,
or planning permissions for road works need to • MLT and SLT denote minimum lead time
be secured before optical fibers can be laid down and standard lead time respectively.
into ground. Standard lead time is a uniform, con- • In “Delay Penalty” column, (1, 2) denotes
tractual lead time that can be offered by a service that a one-day delay of service can incur a
provider to its customers. It refers to the duration penalty cost of 2.
between order submission and order completion • In “Demand” column, (D1, 20) denotes
and is often used to characterize the capacity and that on a calendar day D1 the demand vol-
competitiveness of a service enterprise. ume is 20.
Pricing specifies the price service customers
have to pay for receiving services within standard Business Process
lead time; usually the longer the standard lead
time extends, the lower the price is. Delay pen- A business process contains a set of coordinated
alty specifies penalty cost a service provider has activities to fulfill a service function. The coordi-
to pay for delaying services; usually the longer nation can be represented by a set of pre-defined
the service is delayed, the higher the penalty cost relationships such as “sequential” and “parallel”.
is. Customer demand is the projected incoming Each activity can be mapped to a type of resource
253
Lifecycle Management of SLAs for Service Enterprises
that is required to fulfill the activity. The resource In Figure 2, the business process for the service
can be an internal one within the service enter- contains four activities, called “A1”, “A21”, “A22”
prise or an external one offered by one or more and “A3” respectively, where “A21” and “A22” are
service suppliers. both dependent on “A1”, and “A3” is dependent
Even if a business process may contain multiple on both “A21” and “A22”. Among them, “A1” is
activities, from resourcing perspective, some of associated with an external resource pool, named
these activities can be merged together if they can “Cabling”, “A21” and “A22” are associated with
be fulfilled by the same group of resource. As a an internal resource pool, named “Joining”, and
result, many business processes can be simplified “A3” is also associated with another internal
into single-activity processes. For multi-activity resource pool, named “Testing”. Intuitively, this
processes, their activities often require resource of service is to fulfill the installation of a private
different skill sets. Figure 1 and Figure 2 illustrate circuit line between two sites. It first lays a cable
such two scenarios. between Site A and Site B; it then connects the
In Figure 1, the business process for the ser- cable to the ports at both Sites; finally, it checks
vice contains only a single activity, called “A1”, the quality of the line.
which is associated with a resource pool, named As indicated by Figure 2, laying a cable can
“ADSL”. The resource pool is internal to the be outsourced to an external supplier to fulfill the
service enterprise. Intuitively, the service is to task; joining and testing the cable require expertise
fulfill an ADSL-related function such as broadband and authorities internal to the service enterprise.
installation, migration or cancellation. As joining the cable at Site A and Site B requires
coordination with hosts at both sites, two activities
are used to track these two different threads.
Figure 1. A single-activity process
enterprise resource Plan
254
Lifecycle Management of SLAs for Service Enterprises
• Delay_Penalty =
Number _ of _ Orders
Delay _ Compensation[Completion _ Date(orderi ) Sla negotIatIon and
å -Due _ Date(orderi )] oPtImIzatIon
i =1
Informally, service revenue is summed-up The purpose of SLA Negotiation between a service
prices of incoming service orders; resource cost provider and a service consumer is to work out an
is the total costs of resources that have been agreeable SLA policy between the two parties. As
consumed to fulfill the service orders; delay com- stated in the previous section, such policy often
pensation is summed-up penalty costs for all the covers terms related to service lead times, pricing
delayed service orders. The final business value and delay compensation. During the negotia-
of the service would be service revenue minus tion process, both parties have opportunities to
resource cost and delay penalty.
255
Lifecycle Management of SLAs for Service Enterprises
express their preferences in the SLA terms, and & Addagatla, 1993) and Tabu Search (Weng &
they also need to respect the preferences given Sedani, 2002); in this section, a brief review of
by the other party. these methods is provided.
From a service provider’s point of view, As there is no out-of-box tool available to
the general objective of SLA negotiation is to optimize SLAs for service enterprises, some de-
achieve SLA terms that can satisfy the following sired high-level features of such toolsets are also
criteria: described at the end of this section.
256
Lifecycle Management of SLAs for Service Enterprises
C = {cj}, 1≤j≤J, where J is the total number of Informally, the optimal job allocation scheme is
days and cj is the compensation cost for j number the one that has minimal total compensation cost for
of delayed days. all the delayed orders. The job allocation scheme
Consider a set of arrival orders, D = {dk}, should also be a legal one, where the resource on
1≤k≤K, where K is the total number of days and each day is not over-utilized and the job can only
dk is the number of job arrivals on each day. be carried out after minimum lead time.
For a given combination of R, SLA and D, the
problem is to determine an optimal job allocation Brute force
scheme that can generate best business value. As
we assume that the service price and resource cost For discrete problems in which no efficient solution
are always the same, the problem then becomes method is known, it might be necessary to test each
to minimize the compensation cost. That is possibility sequentially in order to determine if it
H
is the solution, which is also known as Exhaustive
Min: f (s) = å c fin( h)-arr ( h)-SLT , where h is Search, Direct Search or the “Brute Force” method
h=1 K
(Wikipedia, 2009).
the index of an order, H = å d k , and σ is an
k =1 Figure 4 illustrates graphically such a search
arbitrary legal job allocation sequence that satis- method, where each job is given the opportunity
fies the following two conditions: to try all the options applicable to it. The algorithm
for calculating minimal compensation cost using
H
"i : (å Vh ) £ ri , where 1≤i≤I; Vh =1, if Brute Force Search is given in Script 1. Note that
h=1 UB denotes the upper bound of lead time that delays
fin(h)=i, Vh=0, else (1) should not exceed.
Searching for all the possible solutions in an
"h : (2) exponential space is notoriously time-consuming
and operationally prohibitive. The Algorithm de-
Here, we denote arr(h), sta(h), fin(h) as arrival scribed in Script 1 has a computational complexity
date, start date and finish date of job h, respectively, K
Figure 4. Illustration of brute force search for optimal job allocation scheme
257
Lifecycle Management of SLAs for Service Enterprises
258
Lifecycle Management of SLAs for Service Enterprises
259
Lifecycle Management of SLAs for Service Enterprises
ity of O(H×(UB-MLT)). Its difference from FIFO The basic idea of Tabu Search is to slightly
is that it considers compensation cost during job alter a known (current) solution and take the best
allocations, which potentially offers more optimal obtained alternation as the new current solution.
job allocation scheme. To avoid being trapped in local optima, the best
However, Pairwise Shift can by no means neighbor that is worse than the current solution is
guarantee an optimal solution. The way in which allowed to become the new current solution. To
it organizes jobs and pairwise-shifts them are avoid cycling, certain moves are marked as Tabu.
also very random, which represents only one of This procedure continues till a stopping criterion
many possible job allocation schemes. In addi- is met; the stopping criterion could be a limited
tion, Pairwise Shift has a significant limitation number of iterations or some threshold method.
in that it is only capable of shifting jobs between A typical operation that moves the Tabu Search
adjacent resource pools. In more general cases, from current solution to its neighboring solutions
compensation cost reduction could be achieved is to use Pairwise Swap (Weng & Sedani, 2002).
by shifting jobs to longer distances. Figure 7 illustrates two possible neighbors from
the current solution, where Neighbor 1 is obtained
tabu Search by swapping Job 1 and Job 9, Neighbor 2 by Job
5 and Job 7.
The job allocation schemes obtained from heuristic Figure 8 illustrates a possible path of Tabu
procedures such as FIFO and Pairwise Shift are Search from an initial solution to a final solution,
quite random and would not normally be used where the solid arrow lines indicate the chosen
directly; instead they are treated as initial solu- path and dotted arrow lines show other possible
tions for Tabu Search (Weng & Sedani, 2002), moves at different states.
which intelligently explores the neighborhood Tabu Search (Glover & Laguna, 1997) belongs
of the job allocation schemes to yield improved to the class of Local Search (Wikipedia, 2009) al-
solutions if they exist. gorithms that are typically incomplete algorithms,
260
Lifecycle Management of SLAs for Service Enterprises
as the search may stop even if the best solution customer-interactive, time conscious and process
found by the algorithm is not optimal. In other coordinative, where service providers interact
words, there is no guarantee that Tabu Search can directly with customers at the front-end and co-
render optimal solution and the quality of final ordinate timely various activities at the backend
solution is highly dependent on that of the initial to render services. Here, the timing of services
solution. Such a method is often opportunistic, and accurate service level agreements in general
best applicable to situations where decent initial are of paramount importance. Missing product
solutions have been found and bet for chances for delivery deadlines in manufacturing could still
further improvement on those solutions. Gener- make products usable albeit with increased storage
ally speaking, the computational complexity of costs, but missing service delivery deadlines would
Tabu Search is the same as its search space, i.e., result in total waste of service resources.
exponential or O(UB− MLT)H. Given the state of the art in the field, to render
industry-strength SLA optimization capabilities,
further research tracks more R&D effort yet needs to be spent in the
and directions following areas:
In this section, we reviewed some typical opti- • More efficient and effective optimization
mization methods that have been applied to the algorithms. Existing optimization algo-
problem of minimizing delay compensation cost. rithms such as FIFO (Wikipedia, 2009),
In its general form, such a problem is often termed Pairwise Shift (Mannur & Addagatla, 1993)
in the literature as “sequencing with earliness and and Tabu Search (Weng & Sedani, 2002)
tardiness penalties” (Baker & Scudder, 1990), often falls short to render optimal solutions
where penalties are applied not only to tardiness and/or are too time-consuming to operate
but also to earliness and the durations of jobs may in real time. In order to facilitate service
vary. This kind of problem has its origin from enterprises to decide optimal SLAs in real
manufacturing industry where factory workshops time, more efficient and effective optimi-
continuously deal with mono-type of orders that zation algorithms need to be devised.
arrive in volumes; both early and late completions • Coupling with complex business process-
of products would incur costs to manufacturers. es. Existing work in the area of sequenc-
Service business resembles manufacturing ing with earliness and tardiness penalties
business in many aspects, yet it is also typically (Baker & Scudder, 1990) mostly concerns
different from the latter in that services are highly with single-activity processes rather than
261
Lifecycle Management of SLAs for Service Enterprises
multi-activity ones, as the former is more models, service chains, as well as that can
common in the manufacturing domain. In incorporate better optimization and analy-
the service domain, however, processes sis algorithms would certainly add values
that involve timely coordination of various to businesses and help improve the state of
activities are more common that need to be the art in this field (Li, 2008).
modeled and included during the optimiza-
tion stage. Sla-oaSIS toolkit: an example
• Incorporating elaborate business models.
Existing work on SLA-related optimiza- We developed a SLA optimization and analysis
tion such as common due date assignments toolkit for service chains, code-named SLA-OA-
and scheduling (Shabtay, 2008) often as- SIS, to address the deficiencies in this area. In its
sumes a simple business model that does current version, the user can model and configure
not consider counter-acts between busi- individual services and their parameters, as well as
ness elements. As discussed in Section 2.4, optimize SLAs to generate best business values.
there are intricate interdependencies among Figure 9 – Figure 12 show edited service param-
business elements in the context of service eters for PSTN provision; Figure 13 – Figure 15
operation, which needs to be represented show SLA optimization results.
and reasoned to derive more accurate busi- In Figure 9 we define the minimum lead time
ness values. for PSTN provision as 2 days; the standard lead
• Service chain optimization. Modern service time for PSTN provision as 5 days, which is priced
industry accounts for between 50% and at 10 units of local currency. For every delayed
80% of total value add in the developing day, there is an add-up penalty of 1 unit of local
and developed economies (Wolfl, 2006). currency. A forecasted seven-day demand, in term
There is increasing number of complex of number of PSTN orders, under these terms, ar-
service chains that link service enterpris- riving on each calendar day is also configured.
es together via service level agreements. In Figure 10 we configure volume of planned
Existing work related to SLA optimiza- resource that can fulfill PSTN activity across each
tion (Shabtay, 2008) has been limited to calendar day. Also configured is the cost of each
individual service enterprises and fail to unit of resource across every day in a week.
understand the roles of sustainable SLAs In Figure 11 we configure business process
in reducing volatility and number of break- for PSTN provision. In this case there is only a
downs in the service chains. single business activity that requires resource type
• SLA optimization toolkit. To date, there “PSTN”. This is due to the fact that the provision
is no out-of-box toolkit that can perform of PSTN can be taken up by an individual field
SLA optimization functions for service en- technician.
terprises and service chains. Due to lack of In Figure 12 we configure some business
tool support, current SLAs are derived from model parameters. In the section of standard
manual negotiations with service custom- lead time configuration, for instance, we define
ers; as a result, these are often subjective a linear, bounded function to model the impact of
and incapable of reflecting the real capabil- lead time adjustment on the change in customer
ities of service enterprises. Comprehensive demand. In the standard lead time dimension,
toolkits that can model service level agree- the bound is given by standard lead time lower
ments, complex business processes, enter- bound and standard lead time upper bound; in
prise resource plans, elaborate business the customer demand dimension, the bound is
262
Lifecycle Management of SLAs for Service Enterprises
given by maximum market boost percentage for ness value, in this case 400.00. In the middle
standard lead time and maximum market loss section, it shows the optimal standard time, which
percentage for standard lead time. Standard lead is 4 days, and associated business value, which
time increment defines the granularity of discrete is 497.00. Also can be seen are the projected
space in which search for optimal standard lead right-first-time percentages, 28% and 100% for
time can be conducted. optimal and original scenarios respectively. The
In Figure 13 we show the results of lead time right-first-time measures indicate the likelihood of
optimization and analysis. In the upper section, orders being delayed; in some scenarios, to delay
it shows the existing configuration of standard an order may prove to be better off than to reject
lead time, 5 days, and calculated service revenue, an order, as the income generated from the order
resource cost, delay compensation and net busi- could well offset the delay penalty.
263
Lifecycle Management of SLAs for Service Enterprises
In Figure 14 we show the results of optimal pric- In this section we can see some use cases of
ing, 15.00, which gives a business value of 630.00. SLA-OASIS toolkit in configuring enterprise
This is considerably better than the original, 10.00, service and its associated parameters, and op-
which give a business value of 400.00. timizing SLA-related parameters such as lead
In Figure 15 we show the results of optimal time, pricing and delay penalty. Through such a
delay penalty scheme, which is 1.2 times higher toolkit, the user can perform what-if analysis, for
than the original scheme. The optimal scheme instance, topping-up resources to see how it can
gives a business value of 553.00, which is better help reduce lead time, or increasing demand to see
than the original scheme that gives a business how it can force lead time to increase, etc. In this
value of 400.00. way, the toolkit can assist service enterprises to
264
Lifecycle Management of SLAs for Service Enterprises
decide the most competitive yet economic service typical contents related to SLA contracts and
level agreements that they can set up with their toolsets for helping draft SLA contracts.
customers.
contents of Sla contracts
265
Lifecycle Management of SLAs for Service Enterprises
• Problem Management may adjust service lead times, pricing and delay
• Compensation compensation due to demand fluctuation or other
• Customer Duties & Responsibilities operational reasons.
• Warranties & Remedies By setting up SLA terms such as service lead
• Security times in the contract alone would not guarantee
• Intellectual Property Rights & Confidential satisfactory delivery of service. In the section of
Information performance, tracking & reporting, methods of
• Legal Compliance & Resolution of enforcing the implementation of those terms are
Disputes provided. In particular, it explains
• Termination
• General • How each individual service will be
• Signatures monitored,
• What benchmarks, targets and metrics
In the section of introduction, the following should be utilized,
aspects are often provided: purpose and objec- • How to conduct service level reporting,
tives, parties to the agreement, commencement • How to organize service review meetings.
date, duration of the agreement and definitions.
From SLA perspective, this defines to whom and There are bound to be problems occurring
for how long the SLA terms are bound. during the execution of services. In the section
In the section of scope of work, the nature of of problem management, types of such problems
the service is specified, followed by the avail- are defined; contact of service support desk is
ability and the place of service delivery. For large provided; route of problem escalation is given.
service enterprises, these would normally refer to In the events where problems are caused by ser-
service lead times across various geographical vice customers or they were not covered in the
locations. In order to provide a level of flex- original specifications, compensations to service
ibility, the contract could also include terms on providers apply. In the section of compensation,
changes to the service, e.g., service enterprises it tells categories of professional fees, procedure
266
Lifecycle Management of SLAs for Service Enterprises
of invoicing and payment, and interest for late legal expertise in this area. It contains the follow-
payment. ing resources:
As services involve direct interactions be-
tween service providers and service consumers, • SLA Template.
it is important that service customers also take • SLA Interactive Guide.
responsibilities of their duties. In the section of • SLA Introduction Presentation.
customer duties and responsibilities, it states • SLA Audit and Review.
customer duties that involve clients’ personnel, • Service Level Management Presentation.
facilities, resources and training on specialized
equipments. In the section of security, it would Service Level Agreement Template contains a
emphasize on physical and logical accesses to complete set of clauses for SLAs; each clause can
client facilities and resources, compliance with be accepted ‘as is’ or edited to reflect a specific
client security policies and measures of disaster need. Each section of the template is also linked to
recovery. the relevant section of the SLA Interactive Guide
In the events where SLAs have been breached in order that the author can refer to the guidance
due to, for instance, problems cannot be resolved, provided before finalizing each section of his/her
remedies apply. In the section of warranties and own specific agreement. The template is provided
remedies, it defines quality of service, indemni- in MS-Word format, so that the author can edit
fication of any damages by the service provider freely and save as a separate document as wished.
or third parties, and remedies for breaches which Figure 16 illustrates the layout of SLA Interactive
often involve reasonable efforts to restore service Guide and its relationship with SLA Template.
to good operating conditions on an urgent basis SLA Introduction and Service Level Manage-
and payments of penalties and refunds as defined ment Presentation contain presentation slides on
in the contract. SLAs and related issues. SLA Audit and Review
In addition to SLA-specific terms, a proper provides a comprehensive checklist or question-
SLA contract also covers some other general legal naire to audit and review existing SLAs. Figure
aspects. In the section of intellectual property 17 illustrates a fraction of SLA checklist.
right & confidential information, it specifies who
owns intellectual property rights generated from
the work, and confidentiality policies related Sla comPlIance tracKIng
to data and records, etc. In the section of legal and rePortIng
compliance & resolution of disputes, it outlines
general aspects of governing law, export control, After SLA terms become contractual, we move
arbitration, and limitation of liability. to SLA implementation stage, where SLAs are
Finally, in the section of termination, it speci- kept monitored to ensure their compliance. Nim-
fies criteria, causes and payment on termination soft (NimBUS, 2007) is a handy toolkit for SLA
of the contract and SLA terms. In the section of monitoring and reporting. Figure 18 illustrates
signatures, both parties sign off the contract to the architecture of Nimsoft.
make it legally effective. The contractual SLA, in the form of either
written or verbal, is fed into the NimBUS SLA
toolset for drafting Sla contracts Templates, where SLA metrics can be transposed
by configuring an array of out-of-box mathemati-
The SLA Toolkit (SLA-World, 2002) contains a cal formulas for SLA compliance calculations.
set of resources to help service providers create Immediately after SLA metrics configuration,
service level agreement contracts without specific NimBUS automatically generates and distributes
267
Lifecycle Management of SLAs for Service Enterprises
SLA compliance reports. In this section, some key template-driven Sla definition
features of Nimsoft are introduced.
Nimsoft contains graphical SLA templates that
multi-Point data aggregation facilitate SLA definitions. Examples of such con-
and analysis figuration include compliance period (e.g., 1 day,
1 week, 1 month, 1 year), operating period (e.g.,
Critical to effective SLA monitoring and reporting “9am to 5pm, Monday-Friday”, or “7×24 except
is full access to status data representing the end-to- Sundays”), compliance threshold (e.g., 98.5%).
end service infrastructure; this also requires access The Nimsoft SLA Compliance Calculation
to end-user quality of service metrics and service Engine uses mathematical formulas to analyze
desk performance statistics. Nimsoft Probes, Gate- and summarize QoS data points according to users
ways, and Adapters provide this broad data access SLA definitions. For instance, SLA Compliance
and consolidates this information into the Nimsoft Formulas include: Best, Worst, Sequential, Aver-
Quality of Service (QoS) database where the data age, Weight, AND, OR. QoS Compliance Formulas
becomes available for Nimsoft SLA compliance include: Interval, Median, and Average. All the
calculation and reporting. compliance methods and formulas can be custom-
ized to create and satisfy unique SLA compliance
calculation requirement.
268
Lifecycle Management of SLAs for Service Enterprises
269
Lifecycle Management of SLAs for Service Enterprises
toring solution continuously perform calculations persist. Nimsoft SLA reports include color-coded
to determine if the current period SLA is safely in SLA compliance/breach trend indicators with
compliance; it will also determine if a SLA breach forecasted breach date and time.
is imminent if a problem condition is allowed to
270
Lifecycle Management of SLAs for Service Enterprises
271
272
Chapter 15
Cyber Transportation Logistics:
Architecting a Global Value-
Chain for Services
aBStract
In today’s global economy, products and services are provided across international borders. The sourcing
of these products and services becomes an integral part of international businesses. Information, com-
munication and transportation technologies (ICTT) have made this job significantly more streamlined.
However, there is an advantage that big companies, such as Wal-Mart, have over small and medium size
ones. While the big companies have the ICTT resources to source globally at will, small and medium
enterprises (SME) are much less prepared to do so, resulting in a large competitive disadvantage. By
contrasting SMEs with their more successful “big brothers,” we highlight the salient ICTT features in
a system architecture. This serves as a checklist for any assistance that might be rendered to SMEs and
other entities in overcoming their competitive impediment. These findings are the result of numerous
international workshops and conferences held in Hong Kong (the export city for a bulk of the Chinese
consumer products) and in Arkansas (the headquarters of Wal-Mart).
DOI: 10.4018/978-1-61520-603-2.ch015
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Cyber Transportation Logistics
273
Cyber Transportation Logistics
based service economies, there are fundamental after the tragic event of 9/11. The participants in
changes in organizational structures in similar security assurance—whether they are the govern-
places around the globe—including operational, mental bodies, the public, or the businesses—all
decision and control, and behavioral changes. benefit from the resulting safety and security.
Under this scenario, the authors have the unique However, it is not so clear who should shoulder
opportunity and responsibility to reexamine the blunt of solving this problem. It is not clear
the important subject of Cyber Transportation that the party that tends to the weakest point in
Logistics – Architecting a Global Value Chain the chain, the “Achilles heel,” should be the only
for Services. The classic supply chain problem one responsible. A secure supply chain benefits
has been researched by a number of authorities and adds value to each party in the chain. This
(Bowersox et al. 2007, Chopra & Meindl 2007, problem is compounded many times in a global
Coyle et al. 2009, Mangan et al. 2008). However, market place involving many disparate econo-
the core problem—namely identifying a more mies, organizations, and in the lightning speed
general paradigm on the technological factors for of e-commerce and supersonic travel.
success—has yet to be overcome. Sprouting from this cost-benefit issue are many
Two major paradigms of Supply Chain Man- unresolved technical and technology-generated
agement have been proposed (Li, 2008). The questions. For example, what are the different
first is a traditional three-stage view, involving types of economies that participate in the sup-
procurement, conversion, and distribution. The ply chain (Martinez-Olvera, 2008)? Are the
second is a three-flow view, which involves fi- company’s ICTT technologies robust enough to
nancial, information, and product flows (Ding et facilitate the e-commerce that results from such a
al., 2007; Lau et al., 2007). The basic structure supply chain? This is irrespective of whether the
of today’s supply-chain/logistics (SC/L) typically participant is a multinational corporation such
includes three major components: operational as Wal-Mart, or a “mom-and-pop” manufacturer
(information flow), decision and control (plan- in Arkansas or China. In this case, technological
ning, sourcing and procurement decisions), and components range from the streamlined broker-
behavioral (human-system interface, relationship age between suppliers and consumers afforded
management). Effective integration of these com- by today’s information and communication in-
ponents will generate the product/service value frastructure to in-transit visibility as the shipment
flow between SC participants such as sellers and cross international borders. The authors contend
buyers (or suppliers, logistics providers, and that these questions can be answered by address-
customers) within the SC/L network (Bowersox ing the following research and educational thrusts.
et al. 2007). Each of these thrusts addresses a void in current
The core issue can be simply phrased as a research and educational activities—voids that,
cost-benefit incidence problem, i.e., the person when filled, allow a system architecture for cyber
who pays for the costs may not be the only one transportation logistics (CTL) to be designed.
that obtains the benefits. To the extent that goods
and services change so many hands in a supply • E-commerce for Small and Medium
chain before it reaches the ultimate consumer, all Enterprises (SME),
participants in the chain share in the costs and the • Seamless Enterprise Application
benefits. In other words, it is the values they gain Integration (EAI),
that bring the willing partners to participate in this • In-transit visibility in the cyber space,
“chain.” Pick the supply-chain security problem • Information quality and its relationship to
as an example, which has gathered full attention Entity and Identity Resolution,
274
Cyber Transportation Logistics
275
Cyber Transportation Logistics
Table 1. Distribution of firm sizes in Arkansas(Source: 2005 statistics of U.S. businesses data, U.S.
Census Bureau)
About 97% of baitfish farms and 90% of catfish design more challenging and complex than ever
farms are classified as small businesses by the before. The increasing pace of change is driving
US Small Business Administration. Markets and a need for business flexibility to develop strate-
marketing issues are at the forefront of the aqua- gies and tactics to satisfy customer demand while
culture industry in Arkansas today (Engle et al., balancing limitations on supply and the need for
1990; Engle et al., 1991; Hatch et al., 1991; House operational efficiency. There is a great interest
et al., 2003; Kinnucan & Miao, 1999; Kinnucan in electronic marketing of catfish and baitfish in
et al., 1988; Kinnucan & Venkateswaran, 1990; Arkansas, to expand the market and to maintain
Olowolayemo et al., 1992; Raulerson & Trotter, communication between farmers and their buyers.
1973; Rauniya et al., 1997). In order to expand Though some aquaculture farmers use internet for
markets for catfish and baitfish, it is essential to marketing activities, e-marketing of aquaculture
design products that match consumer preferences is in its infancy.
and to encourage consumers’ recognition and ac- The catfish industry in the US is facing a va-
ceptance of new or different products. riety of challenges, including low-price imports
Today, staying ahead of the competition means and a climate of increasing regulations. Three
making the most of limited resources and planning broad strategies exist for responding to these
effectively to identify and select new opportuni- trends. First, US catfish farmers could focus their
ties. This requires better planning using a web attention on becoming a low-cost producer of
of facilities and activities enabling the flow of catfish and compete on the basis of price. Given
goods from raw materials to finished products the higher input (feed, land, labor) costs versus
and finally to the customers. Solutions from the other producing countries (such as China and
supply chain analysis can help the industry to Vietnam), this strategy is not likely be effective.
discover and exploit the hidden opportunities in Second, non-business actions could be taken by
the chain by leveraging enterprise data for tacti- the government to increase protectionism. Such
cal and strategic planning. Understanding and a strategy is likely to have a low probability of
facilitating the chain of supply from farmers to success given the current global trade environ-
consumers (buyers) is critical. ment that emphasizes free trade and reducing
Identification of inefficiencies in the supply barriers to trade. Third, catfish farmers in the US
chain can lead to targeted solutions that match can become much more consumer responsive in
production and demand. Customer requirements their marketing strategies and responsiveness in
and global competition have made supply chain reaching the consumers. This way, they compete
276
Cyber Transportation Logistics
on the high level of consumer benefit and value industry standard for customer service is to replace
delivered. Given the inherent problems with the any fish losses incurred by the delivery intermediar-
first two options, the third strategy appears to ies (Engle & Quagrainie, 2006). The live baitfish
be more appropriate for the catfish industry in industry is also increasingly facing barriers to the
the US. interstate movement of the product. The Arkansas
Over the last several years, various studies have State Authority has recently launched a baitfish
been conducted on catfish market and marketing certification program to provide high quality and
(Dellenbarger et al., 2006; Drammeh et al., 2002; pathogen-free farm-raised baitfish. Based on the
Quagrainie, 2006; Quagrainie & Engle, 2002a; experience in e-marketing of other SMEs (Gilmore
Quagrainie & Engle, 2002b). However, the catfish et al., 2007), it appears that Internet and e-marketing
industry has yet to develop pragmatic marketing has a potential for marketing of Arkansas baitfish.
strategies to meet the challenges ahead. So far, At the same time, more can be done to streamline
catfish marketing research has not been an integral the distribution, delivery system.
part of catfish market development. There is a Farm-retail price spread (calculated as the farm
need for action research on e-marketing of catfish, value share of the retail price) for farm-raised
where research activities will be implemented in aquaculture products is around 15-20% (Engle
partnership with the industry and research findings & Quagrainie, 2006).). The marketing bill (or the
will be directly incorporated into market develop- difference between what the consumer pays and
ment efforts. what the farmer receives) for US farm-raised cat-
Marketing is the most important aspect of fish is very high. Figure 1 shows the monthly real
baitfish production. Retail price of baitfish is 10- farm-raised channel catfish prices at the producer
15 times higher than the wholesale price. In other and processor level, and the marketing bill cost
words, the consumer pays 10-15 times the money for the period 1986-2003. Electronic marketing
received by the farmer. One of the reasons is that of aquaculture products and more streamlined
baitfish are sold as a live product that requires exten- delivery mechanism in general will help reduc-
sive distribution system. The US baitfish industry ing intermediary cost, and thereby enhancing
has a very strong customer service orientation; the competitive advantage.
Figure 1 Monthly real farm-raised channel catfish prices (Source: adopted from Wiese, 2004; original
data from USDA-NASS)
277
Cyber Transportation Logistics
According to the University of Pennsylva- arose for the interactive two-way negotiation of
nia’s Wharton School, Supply Chain Enterprise buy–sell transactions. By tracking the footprint
Systems—information, communication and man- of a participant, cookies allowed interactivity.
agement technologies that support supply chain The third stage is marked by the triangle symbol
functions—have become a central element of man- Δ: Web sites had become both marketplaces and
agement strategy. Implementing these systems, management platforms. It became possible to
however, is often a difficult undertaking with an improve collaboration, strategic alliances, and
uncertain outcome for different enterprises. one-stop business services.
To summarize
278
Cyber Transportation Logistics
279
Cyber Transportation Logistics
Going beyond human/systems interface issues, their services to their customers and suppliers
an equally important problem is Enterprise Appli- and make their applications interoperable for
cation Integration (EAI). Enterprise applications e-commerce.
usually consist of applications written in different It is without a doubt that legacy applications
programming languages, running on different plat- should not be ignored when EAI is discussed. It
forms, and communicating to each other through is definitely not a good idea to suggest companies
different networks. In order to support daily busi- to rewrite their legacy applications for integration.
ness operations, these applications—including One cost-effective way is to develop a wrapper
legacy software—need to be integrated. New around the legacy applications interfacing the
applications also need to be integrated to provide Web services (Chiang, 2007). A wrapper is built
efficient and reliable data exchanges among these to encapsulate a legacy system and provide access
enterprise applications. Software interoperability to the legacy system through the encapsulation
(Wegner, 1996) is a fundamental concern to the layer. This layer exposes only the methods with
development of enterprise applications. parameter attributes to remote service requesters.
Several middleware technologies have been In addition, the wrapper must resolve the incom-
widely used for EAI including CORBA (CORBA, patible communication issues between the legacy
2009), Microsoft COM/DCOM (DCOM, 2009), systems and the Web server using SOAP/XML
.NET (Microsoft .NET 2009), and Enterprise messaging. The implementation details of the
JavaBeans (Enterprise JavaBeans, 2009). The wrappers for web services integration can be
middleware technologies offer a potential solu- found in Chiang (2007).
tion to interoperability problems but also produce
new issues such as interoperability of distinct
middleware implementations (Chiang, 2001). The In-tranSIt vISIBIlIty
problems include different syntax and semantics technologIeS
of the interfaces. Nevertheless, the differences
in the interfaces sometimes can be resolved by In the first Gulf War in the early 1990’s, the
developing an interface adapter to convert one U.S. and her coalition partners poured an over-
to another and vice versa. But very often, the fix whelming amount of supplies to Kuwait before
usually leads to multiple versions of applications. launching a swift war against Iraq. In spite of
Eventually, it will become difficult for software a lopsided technological advantage over the
developers to maintain the consistency in the enemy, several lessons can be learned from the
enterprise applications. war. The most commonly known lesson is the
The web services technology (Webservices, lack of in-transit visibility. This refers to the un-
2009) has been proposed to solve the problems of known contents of tons and tons of supplies that
EAI by connecting applications run by different were dropped off by ships, planes, and ground
companies in the supply chain. The technology transport. The popular press labeled it “just in
provides a standard way of interfacing different case” delivery, instead of “just in time” delivery,
applications in a seamless manner. Heterogeneous as supplies piled up unclaimed. Fortunately, the
applications are exchanging messages in an XML coalition had the luxury to begin the war at a time
document where a program sends a request to a of its own choosing, which in effect mitigates this
Web service across the network, and receives a acute shortcoming.
reply from another program. The reply is also In-transit visibility has progressed significantly
in the form of an XML document. Thus, with since the first Gulf War. Prime examples are found
Web services, companies are allowed to publish in FedEx and UPS. Through a number of tech-
280
Cyber Transportation Logistics
nologies, including GPS and fast communication, When it comes to global supply chains, the
customers can easily find out the whereabouts potential for disruption comes in many forms, from
of their shipment by clicking on the designated large-scale natural disasters and terrorist attacks
webpage. In-transit visibility is a sales advantage, to plant manufacturing fires, electrical blackouts,
highly touted by FedEx, which introduced the and operational challenges such as bureaucratic
practice, and followed by many other just-in-time requirements and red tape and shipping ports being
shippers (Chan & Ponder, 1979). In fact, it goes too small to handle the flow of goods (Bogataj &
well beyond shippers, Riceland in Jonesboro AR Bogataj, 2007). In two representative site visits—
handles its sales shipments in the same fashion. to the Hongkong International Terminal (HIT) and
While the global supply chain are adopting the Memphis Airport operations of FedEx—it is
newer bar-code technologies such as two-dimen- clear that the security issue is paramount in the
sional and reduced-space codes, smart ID tags, post-9/11 global trade. In HIT, the port capacity
or RFID, may gradually replace some or most is also taxed to the limit, necessitating vertical
bar code application for entity identification and stacking of container boxes.
product tracking. The process is gradual because To avoid choke points in the supply chain,
there remain quite a few outstanding technical and containerization represents a transition in shipping
non-technical issues (such as standards, security, technologies. Compared to the 40-ft containers,
privacy, and policy). Aside from RFID, there are the U.S. standard of 53-foot containers is a more
quite a few competing identification-tracking cost-effective way to ship freight. Sometime soon,
technologies. UPS has watched RFID for 15 an entrepreneur will invest billions of dollars to
years but did not see it as an imminent solution construct a fleet of vessels designed to handle only
to the problem of parcel tracking. In test runs, 53-foot equipment. China manufactures almost
UPS found that RFID tags did not surpass the all of the 53-foot container units, and many are
accuracy rate of bar code scanners. Moreover, dispatched loaded with Chinese cargo. If China
an RFID rollout—including tags and a new tech- decides to adopt the 53-foot unit as the standard for
nological infrastructure—would be quite costly. its own internal transportation system, and to serve
UPS decided that they could not simply replace the commercial interests of trade between China
optical scanners with an RFID reader and expect and the US, the freight transportation map of the
an improved return on investment. There have to world will change. It appears that the days of the
be fundamental process changes to leverage the 40-foot container standard in international trade
RFID technology, which are considerable at the are coming to an end. This comes at a time that
present time (Ojala & Hallikas, 2006). China is vying with others in the standardization
As a solution, 25,000 portable bar-code of RFID technologies, often used in conjunction
scanner/terminals—a competing technology to with containerized shipments.
RFID—are in place at 400 UPS sites. In so do- One notable application of RFID in the sup-
ing, UPS has created one of the world’s largest ply chain is the tracking of assets and inventory
Wirelesses Local Area Network. Bluetooth and items in real time within a facility. Such capabil-
Wi-Fi connectivity are also being incorporated into ity allows preparing efficient pick lists, efficient
the handheld computers carried by UPS drivers. dispatching and routing of fork trucks and vehicles
The new electronic clipboards, first deployed in within warehouses and manufacturing facilities,
April 2005, allow a driver to receive last-minute efficient shelving of inventory items and much
delivery or route changes via a truck’s receiver. more. These solutions are known as real-time
Previously, updates came from putting the clip- location-sensing or RTLS (Moeeni, 2008). RTLS
board in a cradle inside the truck, which limits may employ various RF tag types like passive,
its portability. active, etc.
281
Cyber Transportation Logistics
A study by Aberdeen Group (Aberdeen Group, ecuted in conjunction with e-commerce portals, it
2009), shows that firms using RFID deliver would enable products to be tracked in real-time
complete and on time to 98% (against 81% for across the entire supply chain—all the way to the
others), that traceability is made up in 2.5 hours consumer (Niederman et al., 2007).
(compared with 34 hours) and that manufacturers Chu et al. (2007) have proposed a “4th Party”―
which use RFID make 99% in full compliance beyond the manufacturer, the consumer, and the
their products (compared with 86%). regular third party broker—to use web-based
However, in most of today’s RFID implementa- e-commerce technology to coordinate activities
tions, there lacks an easy-to-use and cost-effective throughout the supply chain. If the cost-benefit
way to integrate a company’s RFID equipment and incidence problem is to be addressed, a “fourth”
its backend systems to enable it to enjoy the im- party broker can be employed for SMEs to mini-
provements in supply-chain management (SCM) mize cost. This breakthrough will allow SMEs
that RFID technology can provide. Moreover, the to compete effectively with larger enterprises in
cost of RFID implementation is much higher than executing the various parts of the supply chain,
in traditional automatic identification technology which they can ill afford to do presently. In addi-
(Chen & Chen, 2007). The authors had identified tion, a cost-benefit analysis of RFID implementa-
three gaps: tion in SMEs operations may further help SMEs
to gain competitive advantage in their particular
1. An information gap exists due to the dispar- markets (Leung et al., 2006).
ity of information models
2. A transaction gap exists due to the disparity
in information transaction methods and InformatIon QualIty In entIty
3. An authorization gap exists due to the dis- and IdentIty reSolutIon
parity in authorization requirements.
Identification and tracking technologies can
To resolve the gaps, a middleware, RFID Ap- certainly play an important role for in-transit vis-
plication Enablement (RAE), is developed using ibility, security assurance and storage retrieval.
an object-oriented approach. Object orientation The real question, which is alluded to in the SME
enables encapsulation structured business objects discussion above, is the respective role of the
that encompass RFID memberships, monitoring manufacturer, the shipper, the retailer, vis-à-vis
object conditions and defining object behaviors the carrier in minimizing shipping “choke points”
in terms of RFID operations and publishing RFID and ensuring security. This is not a simple question
object information. The draft recommendation to answer when it comes to the incidence of costs
(ANEC BEUC, 2008) shows some promising and responsibilities. In other words, does a choke
measures focusing on privacy, data protection point at a port facility affect only port operations,
and security in the implementation of these RFID or does it affect every party in the supply chain
applications. and, in turn, may determine the length of the queue
As seen in the case of Wal-Mart, SMEs may of ships to be unloaded in Long Beach Harbor in
be pressured by large retailers and other players California? Is it the sole responsibility of the port
to implement RFID technology in order to comply operator to address this problem, or the collective
with a prescribed information technology (IT) responsibility of all the parties?
infrastructure and processes. Research can be HIT in Hong Kong is one of the largest trans-
employed to integrate RFID technologies with portation terminals in the world, being a terminal
shop-floor control software for SMEs. When ex- operated by the venerable Hutchison Port Hold-
282
Cyber Transportation Logistics
ings, Ltd. Strategically located in the Pearl River of the Universal Product Code or U.P.C.), Global
Delta, their shipment is destined globally from Location Number (GLN), and several others have
Long Beach to Rotterdam. Since 9/11, HIT has significantly contributed to the accurate and unique
been visited numerous times by the U.S. Depart- identification of various entities and objects during
ment of Homeland Security as part of a global war transaction-information exchange.
on terrorism. Since they all belong to the same The EPCglobal organization (EPCglobal 2009)
company, the idea of developing a data network is currently overseeing various standards and
among the forty to fifty Hutchison terminals in protocols for the supply-chain implementation
the world is very appealing. Acxiom, a long estab- of RFID. Passive, backscatter RF tags, referred
lished data-warehousing enterprise based in Little to as class 1, generation 2 (C1G2), functioning
Rock, would definitely be able to contribute their at the ultra high frequency (UHF) is currently
knowledge and expertise in this area. supported by the standards. Passive tags are by
It is well documented that inaccurate, incom- far less expensive than semi-passive or active
plete, inconsistent, and out-of-date information tags. UHF passive tags also offer the highest read
create operational errors, poor decisions, and range compared to other frequencies such as high
damaged customer relations. This could cost frequency or microwave for the same level of
government and industry billions of dollars a allowable output power. The vision is to create
year, and transportation and logistics informa- an RFID-based network that acts as the nervous
tion is not immune from these thorny issues. system of the supply chain for linking the physi-
For example, concerns for privacy conflict with cal world directly to the decision-making process.
accurate entity identification and tracking. The In Figure 3, Object Naming Service (ONS) is a
profusion of geographic subdivisions ranging database and look up service based on Domain
from census tracts to traffic analysis zones often Name System (DNS), which is a hierarchical
introduces inconsistencies in geo-spatial data cod- naming system for computers, services, or any
ing, which lead toward errors in goods delivery resource participating in the Internet. EPC Infor-
and tracking. More precision can be achieved mation Services (EPCIS) is an EPCglobal stan-
through geo-spatial technology based on GPS, dard designed to enable EPC-related data sharing
GIS, relational database management systems within and across enterprises. Together with EPC
and RFID principles. middleware, the system allows a streamline op-
The quality of information created, shared and eration between manufacturers, distributors, and
the decisions made via the macro processes— retailers. The automatic identification, transaction
including Internal Supply Chain Management, recording and tracking of trade items contributes
Customer Relationship Management and Supplier to the quality of data and better supply-chain de-
Relationship Management (Chopra & Meindl cisions by eliminating many intermediate agents
2007)—is as good as the quality of the input and manual processes.
data. Industry studies (GS1, 2009) show that two Future EPCglobal network, which encom-
thirds of product information has data-quality passes ubiquitous low-powered, sensor-equipped,
problems. It has been long established that data RFID networks that are connected through the
entry through keyboard is extremely error prone. Internet, will create new capabilities for manag-
Bar-coding technology has substantially improved ing the supply chain with potential strategic im-
data quality. It also contributed to the efficiency of plications. It will provide unprecedented quality
data-entry process. Bar-code standards, including information in real time, including:
the Global Trade Item Number (GTIN, a superset
283
Cyber Transportation Logistics
• expiration date of a given bottle of milk in collectors, through key processes, to the delivery
the refrigerator, of the final data product. Moreover, the attainment
• a recalled batch of hotdogs, of these requirements is assessed through periodic
• the contaminated shipment of spinach, measurements of data quality in order to facilitate
• variation in the temperature of individual continuous quality improvement and to detect
boxes of ice cream during transit problems before data is released to customers.
• air quality at a particular road intersection, Data-quality/information-quality will soon be an
• traffic-flow data of an Interstate, important issue for most organizations, whether
• the imminent failure of a pacemaker large enterprises such as Hutchison Port Holdings
• the location of the nearest ambulance, fire or SMEs. Meanwhile, interested universities could
truck or police patrol vehicle. participate in this emerging topic in terms of both
research and teaching (Wang, 1998).
However, current research in customer-centric To overcome the challenges faced by SMEs
information-quality management suggests that in adopting and implementing e-commerce,
most organizations still practice “tactical data- the CTL framework—with its on-line trading
quality management.” Tactical data-quality man- platform that includes a fourth-party logistics
agement implies that an organization reacts to services—can facilitate electronic transaction by
adverse data-quality events as they are discovered, bringing together not only sellers and buyers but
in many cases by its customers. On the other hand, also shippers and carriers to collaborate on their
“strategic data-quality management” attempts to supply chain and logistics planning. It applies
define data-quality requirements across the entire information, communication and e-commerce
information system from data contributors and technologies in supporting a range of SC/L activi-
284
Cyber Transportation Logistics
ties such as e-procurement, multiple sourcing, sup- the complete SC, while at the same time includ-
plier selection, collaborative planning, disruption ing relevant security requirements, and leveraging
management, and supply chain visibility (Chu et real-world information to both assess the security
al., 2007; Pare, 2003). level and enforce the security requirements.
The system environment not only improves A large variety and great quantity of products are
connectivity among trading partners but also al- in transit from diverse origins to numerous destina-
lows companies to communicate and collaborate in tions. Increasingly, these products are shipped in
a globally networked supply chain within a single containers, and maritime container transportation
streamlined trading platform with a common user has become the premier transportation mode for the
interface. By leveraging on Internet and other manufacturing industry. In 2002, the International
information and communication technologies, Container Bureau (BIC) estimated the number of
users of this system (e.g., logistics managers or containers world-wide number as 15,000,000. Each
SME owners) can access multiple sub-systems day, those millions of containers, each carrying
(modules) within and across the particular enter- more than 20 tons of products, are conveyed to
prise. This neutral and secure web-enabled trading and from seaports on trucks, rail carriages, barges
platform adds values to the participant parties and ships. Efficient and reliable such flows may
in areas such as information exchange, product be, this huge volume of container movements, be-
visibility, and process optimization which in turn sides significantly increasing the complexity of the
reduce inventory, decrease delivery times, and global maritime transportation system (Robinson
improve inventory turnarounds. 1998), poses formidable security challenges to
freight and people.
Containers have for a long time been used
SecurIty aSSurance for clandestine immigration, illegal weapons
smuggling and drug smuggling. However, the
Since the 9/11 tragedy, the supply chain security associated risks (Tsai, 2006) and possible con-
risk has been gaining fast-growing interest: global sequences are incomparable to those associated
supply chain managers have started to fear that with weapons of mass destruction. A solution is to
the logistics networks might be used as targets design and implement an expert system dedicated
of, and/or vectors for, further terrorist attacks, to maritime container security risk management.
leading to deep and long-lasting disruptions in The approach encompasses the three core ele-
the supply chains that would add to those already ments of (1) risk modeling, (2) risk assessment
caused by ill-operated procurement processes, and (3) risk management (Bechini et al. 2007,
capacity constraints, and/or quality issues in GOST 2009). Risk modelling is process-based.
factories. Therefore, global supply chain vulner- It is an “activity-resource” model well suited
ability has become a capital issue for all of the for logistics systems analysis and the associated
logistics networks’ partners, and security is now security-centric performance monitoring. The
an unavoidable high-performance factor for sup- data-collection methodology followed at this
ply chains. stage is case-based, within a set of typical SCs
In such a context, with the growing pressure involving internal (e.g., Port of Le Havre) and also
from national and international regulation bodies external logistics actors. The processes taken into
to enhance security, Supply Chain Management account go from the origination port to point of
has to address an end-to-end issue: achieve a destination (for imports) and from point of origin
cost-effective and lead-time efficient design of to the destination port (for exports).
285
Cyber Transportation Logistics
Risk assessment is addressed with reference to As the World Customs Organization (WCO)
such security-dedicated standards as food industry progresses with the implementation of the WCO
Hazard Analysis and Critical Control Points. As- SAFE Framework of Standards to secure and
sociated with it is the military-born Failure Mode facilitate global trade, parameters of the Autho-
and Effects Analysis, which is a risk assessment of rized Economic Operator (AEO) programs are
reliability widely practiced in the aerospace and developed. Supply-chain compliance-software
automotive industries. Risk management is taken provides electronic collection, standardization and
care of through the implementation of an expert- organization of supplier information, allowing the
system coupling a database to a knowledge base. user to efficiently collect information required for
The database is fed with real-time and automati- AEO certification. Such a system may bring the
cally collected information from the monitored cost down for SMEs who are inevitably part of
logistics operations. The knowledge base is fed the security picture.
with the expertise of, among others, customs /
police / immigration agents, lawyers, and port
authorities. To optimize container transit security modelIng and SImulatIon
and facilities, the expert-system inference engine technologIeS
first interprets information on the incoming (from
sea or from land) container and then presents a This chapter proposes IT solutions for Cyber
solution for dealing with each cargo, on the basis Transportation Logistics (CTL). These include
of available expert knowledge. the existing IT enterprise business applications
The expected impacts of the project at the and information sharing among organizations.
technical and scientific levels are numerous. Enterprise Resource Planning (ERP)—broadly
defined here as the science of enterprise planning,
• development of a service for securing the management and execution—has progressed
transport of cargo (better monitoring of significantly over the last two decades or so. The
sensitive materials and protection against “curse of dimensionality” in solving these busi-
malicious acts) ness problems has been tempered by a number
• Integrating sensors such as RFID, from of advancing techniques, including the use of
different origins, embedded in a system of asymptotic error bounds (Bramel & Simchi-
traceability and complete protection Levi 1997), and a priori/robust optimization
• Development of an electronic platform (Bertsimas & Simchi–Levi 1996, Laporte et al.
with shared interfaces to the platforms of 1994). Capitalizing on grid computing and the
existing owners and semantic web concept, today’s knowledge base
• Implementation of an innovative solution. and E-platform allow step-by-step procedures to
perform the following functions: (a) site location,
For all users, the platform offers productiv- (b) location-routing, (c) competitive allocation
ity gains by optimizing the links in the transport of products/services, and (d) spatial economic
chain. The prototype offers the potential for global forecasting. They are some of the key analytic
service traceability and security of the transport ingredients in CTL.
chain. Ultimately, it offers the potential for the Chan (2005) showed that there is an emerging
development of an “information system port,” science in capturing most of these analysis func-
transferable to other port communities, either tions. For example, many of these procedures
locally or globally. can be captured in the judicious use of a weight
286
Cyber Transportation Logistics
matrix for location and allocation. Such a frame- ICTT, we envision a CTL system architecture
work can be used to analyze spatial equilibrium, for global commerce. While large enterprises
or the resulting trade patterns among participat- are well positioned to be a prominent member of
ing enterprises. This is accomplished through CTL, SMEs are much less prepared to do so at
competition and gaming in spatial dynamics, the present time. While we paint an encouraging
analyzing market share and geographic coverage. picture, it is clear from the above discussions that
User vs. system optimization, as illustrated in the CTL has many technical and non-technical
the Braess’ Paradox, can be generalized to other components that discourage SME participations.
contexts, showing the results of competition vs. One such component is education and training for
collaboration among SMEs. These results include the SME work force. Today’s CTL work-force
Cournot–Nash equilibrium for user optimization requires these educational and training support:
and monopolistic-market equilibrium for system
optimization respectively. Furthermore, regional • Logistics work-force development to en-
and international input-output economic-devel- dow workers with familiarity and appre-
opment implications can be ascertained within ciation for today’s ICTT
this analytical framework. This is particularly • Science, Technology, Engineering and
important for venture capitalists and governments Mathematics related enhancement for un-
that are considering investing in a public e-trading der-represented groups
platform. In view of the significant advances in • Logistics education/training on modeling-
this field, other management-science contributions and-simulation, including virtual-reality
toward analyzing this subject can be found in the technologies.
list of references in Chan (2005).
Meanwhile, three-dimensional (3D) virtual To show the cogency of this issue, FedEx, JB
worlds, like Second Life (SL), provide a simula- Hunt, Wal-Mart and the National Science Founda-
tion platform to investigate smart-world domains tion has funded the Mid-America Transportation
like CTL. TagCentric was first developed, which Center (MATC) in Arkansas to train the work
is an agent-based RFID middleware available on force required for today’s logistics industries.
SourceForge. A project at the University of Ar- MATC educates and trains students in all of the
kansas (http://vw.ddns.uark.edu) is investigating three support functions for e-SCL. While the first
ubiquitous computing, location-aware systems, two of the three functions are self explanatory, the
virtual RFID, massive use of sensors, smart de- third needs some explanation.
vices, workflows, ways of merging reality and As explained, there are two major paradigms
virtual reality, and means of talking to devices for SCM:
using natural language. The potential impact of
testing these technologies in a simulated world • Three-stage view, which consists of pro-
before deployment could lower costs and acceler- curement, conversion, and distribution
ate the pace of technological change. • Three-flow view, consisting of financial,
information, and product flows
287
Cyber Transportation Logistics
Furthermore, the authors provide information- tracking technologies to go beyond the current
based research and data-quality management stalemate that surround RFID implementation.
best practices to the majority of CTL enterprises, These efforts will have monumental impacts on
including SMEs, IT-intensive industries, nonprofit information-based manufacturing, logistics and
and governmental bodies. security assurance. While large retailers such as
Educational institutions are starting to embrace Wal-Mart already have this service in place, the
this interpretation of SCM. Online simulation less well-endowed SMEs do not. Apparently, the
games now are used to introduce the financial- Department of Defense also needs such a service,
flow implications to students. For example, the as evidenced from the delivery of materiel and
Responsive.Net Simulator combines cash-flow supplies during the first Gulf War.
position with lot size and lead time, with some To successfully implement a workflow in an
analysis regarding the optimal ordering policy. It organization, there are four fundamental elements
considers adding production capacity at different (Karmarkar & Apte, 2007):
points in the simulation.
Harvard Business Publishing’s SCM simula- • Data Base Management System
tion combines cash flow with product design, • Work Flow Management System
vendor selection and procumbent management • Administration and Monitoring (access
strategies. It also includes justification for con- control mechanisms, especially those that
tingency actions, such as change of contracts or are related to other organizations)
an interim marketing survey. • Applications (providing services, such as
ERP)
288
Cyber Transportation Logistics
289
Cyber Transportation Logistics
services, where telecom companies are vying to address this problem on behalf of China, including
provide travelers with information ranging gas- the provision of ERP services for AEO (Pibernik
station locations to where to eat lunch, not to say & Sucky, 2007).
ascertaining the whereabouts of individuals or A large number of case studies on e-commerce
objects of interest. in SME conducted over the last few years (e.g.,
With today’s communication network, E- Poon & Swatman, 1997; Henderson, 2001;
commerce has been gradually evolving into Baourakis et al., 2002; Vlosky & Westbrook,
Mobile Commerce (Ngai et al., 2007). Examples 2002; Abate & Moser, 2003; Alexander et al.
include location-based services, mobile financial 2003; Chau, 2003; Cordeiro, 2003; Galloway
applications, and product locating and searching. et al. 2004; Grandon et al. 2004; Henderson et
It is clear that more research is warranted for al., 2004; Holmes et al., 2004; Yasin et al. 2006)
these constituent enabling technologies: wire- show that e-commerce offers SMEs significant
less network infrastructure, mobile middleware, operational and strategies opportunities. But, the
including data stream management, database implementation of effective e-commerce based
management, and wireless user infrastructure business model in SMEs is not without serious
(such as mobile handheld devices). (Ngai & Gu- organizational and technological challenges.
nasekaran, 2007) For catfish and baitfish industries in Arkansas,
As the World Customs Organization (WCO) various university campuses are keen to provide
progresses with the implementation of the WCO leadership and guidance to develop strategies for
SAFE Framework of Standards to secure and electronic marketing and physical distribution of
facilitate global trade, parameters of the Autho- these aquaculture products, which will keep these
rized Economic Operator (AEO) programs are industries competitive and improve the welfare
developed. Supply-chain compliance-software of the stakeholders concerned.
provides electronic collection, standardization and The rapidly evolving global SC is creating a
organization of supplier information, allowing the historic demand for a technological workforce to
user to efficiently collect information required for support all components of this system. The edu-
AEO certification. Here are some issues raised by cational and training implications of this revolu-
Wigand (2006): tion are profound. To achieve this goal requires
workers who have skills not only in transportation,
• How to develop an AEO program for SME distribution, and logistics but also in GPS, GIS,
businesses, which do not have an advanced identification technologies, Database Manage-
ERP system? ment Systems, and financial flow.
• AEO redesign process only works if leg- It is clear that sound solutions to the CTL
islation is changed at an international and problem require a holistic, multinational and multi-
national level. disciplinary approach that engages the talents of
universities, industries and governments around
For Chinese SMEs, for example, intellectual the globe. The authors’ goal is to marshal the in-
property protection is weak. There is a prolifera- terests not only of the university community, but
tion of forged brands. However, Hong Kong has also the industries and governmental bodies that
restrictive laws and regulations on Intellectual can benefit from the results of a cooperative, en-
Property protection. As a gateway to the outside trepreneurial, educational and research activity.
world, again it can serve as a knowledge hub to
290
Cyber Transportation Logistics
291
Cyber Transportation Logistics
Bramel, J., & Simchi-Levi, D. (1997). The logic CORBA. (2009). CORBA. Retrieved March 9,
of logistics. New York: Springer. 2009, from http://www.corba.org
Cannon-Bowers, J. A., & Salas, E. (2001). Reflec- Coyle, J. J. Langley, Jr., Gibson, B. J., Novack, R.
tion on shared cognition. Journal of Organizational A., & Bardi, E. J. (2009). (8th ed.). Supply chain
Behavior, 22, 195–202. doi:10.1002/job.82 management: A logistics perspective. Florence,
KY: South-Western Cengage Learning.
Chan, Y. (2005). Location, transport, and land-use:
Modelling spatial-temporal information. Heidel- DCOM. (2009). DCOM. Retrieved March 9, 2009,
berg, Germany: Springer. from http://msdn.microsoft.com/en-us/library/
ms809340.aspx
Chan, Y., & Ponder, R. (1979). The small package
air freight industry in the United States: A review de Haan, J., Kisperska-Moron, D., & Placzek, E.
of the Federal Express experience. Transporta- (2007). Logistics management and firm size: A
survey among Polish small and medium enterprises.
tion Research, 13, 221–229. doi:10.1016/0191-
International Journal of Production Economics,
2607(79)90048-7
108, 119–126. doi:10.1016/j.ijpe.2006.12.009
Chau, S. (2003). The use of e-commerce amongst
Dehning, B., Richardson, V. J., & Zmud, R.
thirty-four Australian SMEs: An experiment or a
W. (2007). The financial performance effects
strategic business tool? Journal of Systems and
of IT-based supply chain management systems
Information Technology, 7(1), 49–66. in manufacturing firms. Journal of Opera-
Chen, S.-C., & Chen, H.-H. (2007). Implementation tions Management, 25, 806–824. doi:10.1016/j.
and application of RFID EPC information service jom.2006.09.001
for forward and reverse logistics. Journal of Global Dellenbarger, L. E., Dillard, J., Schupp, A. R., Za-
Business Management, 2(2). pata, H. O., & Young, B. T. (2006). Socioeconomic
Chiang, C.-C. (2001). Encapsulating legacy systems factors associated with at-home and away-from
for use in heterogeneous computing environments. home catfish consumption in the United States.
Agribusiness, 2, 35–46.
Information and Software Technology, 43(8),
497–507. doi:10.1016/S0950-5849(01)00160-4 Ding, Q., Dong, L., & Kouvelis, P. (2007). On the
integration of production and financial hedging
Chiang, C.-C. (2007). Software modernization of
decisions in global markets. Operations Research,
legacy systems for web services interoperability.
55, 470–489. doi:10.1287/opre.1070.0364
In Mario Freire and Manuela Pereira (Ed.), Ency-
clopedia of Internet Technologies and Applications. Drammeh, L., House, L., Sureshwaran, S., &
Hershey, PA: Idea Group Publishing. Selassie, H. (2002, July). Analysis of factors in-
fluencing the frequency of catfish consumption
Chopra, S., & Meindl, P. (2007). (3rd ed.). Supply in the United States. In Proceedings of the 2002
chain management. Upper Saddle River, NJPren- American Agricultural Economics Association
tice Hall. Annual Meeting. Long Beach, CA.
Chu, S.-C., Leung, L. C. Y., Hui, V., & Cheung, Engle, C. R., Capps, O., Dellenbarger, L., Dillard,
W. (2007). Evolution of e-commerce web sites: J., Hatch, U., Kinnucan, H., & Pomeroy, R. (1990).
A conceptual framework and a longitudinal The U. S. market for farm-raised catfish: An over-
study. Information & Management, 44, 154–164. view of consumer, supermarket, and restaurant
doi:10.1016/j.im.2006.11.003 surveys. Fayetteville, AR: Arkansas Agricultural
Experimental Station, 925, Southern Regional
Aquaculture Center 511.
292
Cyber Transportation Logistics
Engle, C. R., Capps, O., Dellenbarger, L., Dillard, Henderson, J., Dooley, F., & Akridge, J. (2004).
J., Hatch, U., Kinnucan, H., & Pomeroy, R. (1991). Internet and e-commerce adoption by agri-
Expanding U. S. markets for farm-raised catfish. cultural input firms. Review of Agricultural
Arkansas Farm Research, 40(6), 5–6. Economics, 26(4), 505–520. doi:10.1111/j.1467-
9353.2004.00196.x
Engle, C. R., & Quagrainie, K. (2006). Aquacul-
ture marketing handbook. Boston, MA: Blackwell Henderson, J. R. (2001). Networking with e-
Publishing. commerce in rural America. Retrieved June 28,
2009, from http://www.kc.frb.org/RegionalAf-
Enterprise JavaBeans. (2009). JavaBeans. Re-
fairs/Mainstreet/MSE_0901.pdf
trieved March 9, 2009, from http://java.sun.com/
products/ejb/ Holmes, T. P., Vlosky, R. P., & Carlson, J. (2004).
An exploratory comparison of Internet use by
EPCglobal. (2009). EPCglobal Standards. Re-
small wood products manufacturers in the north
trieved March 6, 2009, from http://www.epcglo-
Adirondack region of New York and the State
balinc.org/standards
of Louisiana. Forest Products Journal, 54(12),
GS1. (2009). GS1barcode and eCom. Retrieved 277–282.
March 6, 2009, from http://barcodes.gs1us.org/
House, L., Hanson, T., Sureshwaran, S., & Se-
dnn_bcec/Default.aspx
lassie, H. (2003). Opinions of U.S. consumers
Galloway, L., Mochrie, R., & Deakins, D. (2004). about farm-raised catfish: Results of a 2000-2001
ICT-enabled collectivity as a positive rural busi- survey. Mississippi Agricultural and Forestry
ness strategy. International Journal of Entrepre- Experimentation Station Bulletin, 1134.
neurial Behavior and Research, 10(4), 247–259.
Kaplan, S., & Sawhney, M. (2000). E-hub: the
doi:10.1108/13552550410544213
new B2B marketplaces. Harvard Business Review,
Gilmore, A., Gallagher, D., & Henry, S. (2007). 78(3), 97–103.
E-marketing and SMEs: Operational lessons for
Karkkainen, M., & Laukkanen, S., Sarpola,
the future. European Business Review, 19(3),
& Kemppainen, K. (2007). Roles of interfirm
234–247. doi:10.1108/09555340710746482
information; systems in supply chain manage-
GOST. (2009). Geolocalisation optimisation et ment. International Journal of Physical Distribu-
securisation du transport de conteneurs. Retrieved tion & Logistics Management, 37(4), 264–286.
March 6, 2009, from http://projet-gost.org/ doi:10.1108/09600030710752505
Grandon, E. E., & Pearson, J. M. (2004). Electronic Karmarkar, U. S., & Apte, U. M. (2007). Opera-
commerce adoption: An empirical study of small tions management in the information economy:
and medium US businesses. Science Direct, 42(1), Information products, processes, and chains.
197-216. Retrieved June28, 2009, from http:// Journal of Operations Management, 25, 438–453.
www.sciencedirect.com doi:10.1016/j.jom.2006.11.001
Hatch, U., Engle, C. R., Zidack, W., & Ketchen, D. J., & Hult, T. M. (2007). Bridging
Olowoloyemo, S. (1991). Retail grocery markets organization theory and supply chain manage-
for catfish. Alabama Agricultural Experimental ment: The case of best value supply chains.
Station Bulletin, 611. Journal of Operations Management, 25, 573–580.
doi:10.1016/j.jom.2006.05.010
293
Cyber Transportation Logistics
Kinnucan, H., Sindelar, S., Wineholt, D., & Hatch, McGladrey, R. S. M. (2009). RSM. Retrieved June
U. (1988). Processor demand and price markup 28, 2009, from http://www.rsmmcgladrey.com/
functions for catfish: A disaggregated analysis with
Meroño-Cerdan, A. L., Soto-Acosta, P., & Lopez-
implications for the off flavor problem. Southern
Nicolas, C. (2008). How do collaborative tech-
Journal of Agricultural Economics., 20, 81–92.
nologies affect innovation in SMEs? International
Kinnucan, H., & Venkateswaran, M. (1990). Ef- Journal of e-Collaboration, 4(4), 33–50.
fects of generic advertising on perceptions and
Moeeni, F. (2008). A passive RFID location sensing.
behavior: the case of catfish. Southern Journal of
In Proceedings of the 12th World Multi-Conference
Agricultural Economics, 22, 137–151.
on Systemics, Cybernetics and Informatics (pp.
Kinnucan, H. W., & Miao, Y. (1999). Media-specific 84-89).
returns to generic advertising: The case of catfish.
Nam, C. S., Johnson, S., Li, Y., & Seong, Y. (2009).
Agribusiness . International Journal (Toronto,
Evaluation of human-agent user interfaces in multi-
Ont.), 15, 81–99.
agent systems. International Journal of Industrial
Laporte, G., Louveaux, F. V., & Mercure, H. (1994). Ergonomics, 39(1), 192–201. doi:10.1016/j.er-
A priori optimization of the probabilistic travel- gon.2008.08.008
ing salesman problem. Operations Research, 42,
Ngai, E. W. T., Cheng, T. C. E., Auc, S., & Lai,
543–549. doi:10.1287/opre.42.3.543
K.-H. (2007). Mobile commerce integrated with
Lau, A. H. L., Lau, H.-S., & Zhou, Y.-W. (2007). RFID technology in a container depot. Deci-
A stochastic and asymmetric-information frame- sion Support Systems, 43, 62–76. doi:10.1016/j.
work for a dominant-manufacturer supply chain. dss.2005.05.006
European Journal of Operational Research, 176,
Ngai, E. W. T., & Gunasekaran, A. (2007). A review
295–316. doi:10.1016/j.ejor.2005.06.054
for mobile commerce research and applications.
Leung, Y. T., Cheng, F., Lee, Y. M., & Hennessy, J. Decision Support Systems, 43, 3–15. doi:10.1016/j.
J. (2006). A tool set for exploring the value of RFID dss.2005.05.003
in a supply chain. To appear in H. Jung, F. F. Chen,
Niederman, F., Mathieu, R. G., Morley, R., & Kwon,
& B. Jeong (Ed.), Trends in Supply Chain Design
I.-W. (2007). Examining RFID applications in supply
and Management: Technologies and Methodolo-
chain management. Communications of the ACM,
gies. Heidelberg, Germany: Springer-Verlag.
50, 92–101. doi:10.1145/1272516.1272520
Li, E. (2008). Supply chain management in China.
Nucciarelli, A., & Gastaldi, M. (2008). Information
In The International Cyber Transportation Logistics
technology and collaboration tools within the e-sup-
Conference. Petit Jean Mountain, AR.
ply chain management of the aviation industry. Tech-
Li, E. Y., Du, T. C., & Wong, J. W. (2007). Ac- nology Analysis and Strategic Management, 20(2),
cess control in collaborative commerce. Decision 169–184. doi:10.1080/09537320801931309
Support Systems, 43, 675–685. doi:10.1016/j.
Ojala, M., & Hallikas, J. (2006). Investment
dss.2005.05.022
decision-making in supplier networks: manage-
Martinez-Olvera, C. (2008). Methodology for ment of risk. International Journal of Produc-
realignment of supply-chain structural elements. tion Economics, 104, 201–213. doi:10.1016/j.
International Journal of Production Economics, ijpe.2005.03.006
114, 714–722. doi:10.1016/j.ijpe.2008.03.008
294
Cyber Transportation Logistics
Olowolayemo, S. O., Hatch, U., & Zidack, W. Robinson, R. (1998). Asian hub/feeder
(1992). Potential U.S. retail grocery markets for nets: the dynamics of restructuring. Mari-
farm-raised catfish. Journal of Applied Aquacul- time Policy & Management, 25(1), 21–40.
ture, 1, 51–71. doi:10.1300/J028v01n04_05 doi:10.1080/03088839800000043
Pare, D. J. (2003). Does this site deliver? B2B Scholtz, J. (2002). Evaluation methods for
e-commerce services for developing coun- human-system performance of intelligent sys-
tries. The Information Society, 19, 123–134. tems. InMessina, E. R., & Meystel, A. M. (Eds.),
doi:10.1080/01972240309457 Proceedings of the 2002 Performance Metrics
for Intelligent Systems (PerMIS) Workshop. Re-
Pibernik, R., & Sucky, E. (2007). An approach
trieved June 28, 2009, from http://www.isd.mel.
to inter-domain master planning in supply chain.
nist.gov/research_areas/research_engineering/
International Journal of Production Economics,
Performance_Metrics/PerMIS_2002_Proceed-
108, 200–212. doi:10.1016/j.ijpe.2006.12.010
ings/Scholtz.pdf
Poon, S., & Swatman, P. M. C. (1997). Small busi-
Trappey, C. V., Trappey, A. J. C., Lin, G. Y.
ness use of the Internet: Findings from Australian
P., & Lee, W. T. (2007). Business and logistics
case studies. International Marketing Review, 14(5),
hub integration to facilitate global supply chain
385–402. doi:10.1108/02651339710184343
linkage. Proceedings of the Institute of Me-
Quagrainie, K. (2006). IQF catfish retail pack: chanical Engineering, Part B: J. Engineering
A study of consumers’ willingness to pay. Inter- Manufacture, 221, 1221-1233. Retrieved June
national Food and Agribusiness Management 28, 2009, from https://commerce.metapress.
Review, 9(2), 16–27. com/content/755k858k74706609/resource-
secured/?target=fulltext.pdf&sid=4h3gmljzsnf
Quagrainie, K. K., & Engle, C. R. (2002a). A
c0q45n1ak3b55&sh=journals.pepublishing.com
latent class model for analyzing preferences for
catfish. Aquaculture Economics and Management, Tsai, M.-C. (2006). Constructing a logistics
6(1), 23–34. tracking system for preventing smuggling risk
of transit containers. Transportation Research,
Quagrainie, K. K., & Engle, C. R. (2002b).
40, 526–536.
Analysis of catfish pricing and market dynam-
ics: The role of imported catfish. Journal of Vlosky, R. P., & Westbrook, T. (2002). E-business
the World Aquaculture Society, 334, 389–397. exchange between homecenter buyers and wood
doi:10.1111/j.1749-7345.2002.tb00018.x products suppliers. Forest Products Journal,
52(1), 39–43.
Raulerson, R., & Trotter, W. (1973). Demand for
farm-raised channel catfish in supermarkets: An Wang, R. Y. (1998). A product perspective
analysis of selected market. (Marketing Research on total data quality management. Com-
Report No. 993). Washington DC: SDA Economic munications of the ACM, 41(2), 58–65.
Research Service. doi:10.1145/269012.269022
Rauniyar P. G., Hermann, R. O., & Hanson, G. Wang, Y., Potter, A., & Naim, M. (2007). Electron-
D. (1997). Identifying frequent purchasers of ic marketplaces for tailored logistics. Industrial
seafood at home and restaurants consumption. Management & Data Systems, 107(8), 1170–1187.
The Southern Business and Economic Journal, doi:10.1108/02635570710822804
114-129.
295
Cyber Transportation Logistics
296
Cyber Transportation Logistics
Middleware: The software serves as the glue to Radio Frequency Identification (RFID):
connect different applications to work together. RFID is a technology that reads data from elec-
Online Trading Platform/Infrastructure: An tronic tags to identify items.
e-commerce model, that aside from providing in- Real Time Location Sensing (RTLS): RTLS
formation about sellers (e.g., electronic catalogs), is an RFID-based technology for asset tracking
allows multiple sellers/suppliers/vendors and and location identification.
buyers/customers to conduct business transactions
through a web server.
297
Section 6
Industry Service Models,
Profession Development and
Outlook
299
Chapter 16
Perceived Risk Management:
Applying the TEID Model to
the Traveler Service Chain
Magali Dubosson
Haute Ecole de Gestion de Geneve (HEG), Switzerland
Emmanuel Fragnière
Haute Ecole de Gestion de Geneve (HEG), Switzerland & University of Bath, Switzerland
aBStract
Purpose – To contribute to the theoretical work on service-perceived risk management of knowledge-based
services (i.e. intangible and heterogeneous) and experience-based services and to suggest a framework
that helps to formalize these risks and the value associated with their management, by arguing that
this risk management relies on a sequence of risks (Threat, Event, Ignorance and Damage, called the
TEID model) and on 3 categories of control measures (preventative, detective and protective). Design
/ methodology / approach – A case study research using the guidelines developed by Eisenhardt (1989)
in the context of travel agency industry about how to deliver added value by selling the expertise that
helps to reduce customer-perceived risks. Risk management and control process constructs were com-
pared in order to confirm the relevance of this approach. Findings – Customers feel that travel services
which are bought encompass a lot of uncertainties and annoyances (risks) about what they will be
experiencing. At present customers are not willing to pay for advice that they regard as free. In order
to charge and deliver more added-value, knowledge-based service providers have to make their role
more tangible, aiming at reducing and managing risks. By categorizing customer-perceived risks, and
by integrating control measures and assurances into their offer, providers can design new and valuable
services. Service value-chains involve various providers (implicitly or otherwise) who may engender
annoyance and damages as risks are a sequence of events. For their effective management risks have to
be considered from the customer’s point of view as this is the only way to apply an integrated approach.
Originality / value – This chapter holds the potential to contribute to extending an understanding and
management capacity of customer-perceived risks of knowledge-based services. It brings into play a
new framework and new risk management process. It also helps with formalizing and making tangible
customer added-value.
DOI: 10.4018/978-1-61520-603-2.ch016
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Perceived Risk Management
300
Perceived Risk Management
301
Perceived Risk Management
and heterogeneity in particular make identification Jacoby and Kaplan (1972) identified five in-
of risks difficult. dependent types of risk: financial, performance,
Owing to the instantaneity, heterogeneity and physical, psychological and social. Some authors
intangibility of services, there is little evidence of later recommended combining social and psycho-
service problems. Moreover, perception of problem logical types of risk, as consumers found it difficult
(quality) is subjective and the individual percep- to choose between them, and using instead the
tion often cannot be related to what was actually psychosocial type of risk. Roselius (1971) added
delivered. The most patent clue to a service problem a sixth type of risk: time loss.
is a customer complaint. In order to avoid waiting Product intangibility greatly increases the
for customer complaints and having to recover degree of perceived risk (Finn, 1985; McDougall
from a service problem, our research favors a more and Snetsinger, 1990). Intangibility is composed
integrated approach. Risk management should be of 3 dimensions: physical intangibility, mental
designed with potential problems taken into account intangibility, generality (Laroche et al., 2001).
and applied all the way down the supply-chain They observed that there is a strong relationship
simultaneously with the delivery. between mental intangibility and perceived risk,
an association between physical intangibility and
perceived risk, but generality has either little or
the notIon of PerceIved no direct impact on perceived risk. Laroche et al.
rISK: lIterature revIeW (2003; 2004) studied the impact of intangibility
on perceived risk and the moderating roles of
The effect of perceived risk is believed to have involvement and knowledge. As they expected,
a greater effect on the consumer for services involvement has a positive moderating effect and
(Murray and Schlacter, 1990). Perceived risk knowledge has a negative moderating effect, i.e.
is a two-dimensional construct comprising the the more respondents were knowledgeable, the
uncertainty involved in a purchase decision and less intangibility exerted a significant impact on
the consequences of taking an unfavorable action perceived risk. As they assumed, people perceive
(Bettman, 1972). The perception of risk has been potential risks in the unknown.
found as totally subjective (Havelena and DeSarbo, Knowledge is recognized as a characteristic
1990; Ross, 1975). Perceived risk was considered that influences how consumers evaluate the risk
as a subjective expectation of loss (Peter and Ryan, inherent in their purchase (Murray and Schlacter,
1976; Mitchell and Greatorex, 1993). 1990). As cited by Laroche et al., Engel et al. (1993)
Mitchell revealed that consumers judging low have defined knowledge as “the information stored
probability/high consequence risks, e.g. purchasing within memory”. Park et al. (1994) have defined
an airline ticket, are affected more by the conse- knowledge assessment as a judgment process in
quence size than by the probability, and many appear which consumers scan memory for cues to help
to disregard the probability altogether (Mitchell, them evaluate their product-related experiences.
1998). An example often used is that car accidents Knowledge is often conceptualized with two
kill many more people per year than airplane crashes related dimensions: experience and expertise.
but people tend to be more afraid of traveling by Expertise is potential, latent and virtually realiz-
plane than by car. Slovic and Lichtenstein (1968), able by the consumer. Experience differentiates
and Horton (1976) also found that the degree of itself from expertise by the fact that it is concrete,
negative consequences was much more important operational and actualized by the consumer. Ex-
in determining risk than the probability of their perience is a much less useful way of reducing
occurrence. risk for services than for goods because of the
302
Perceived Risk Management
heterogeneity involved in producing and consum- the problem is that the customer will experience
ing services (Mitchell and Prince, 1993). and sometimes suffer from these annoyances.
Tan and Cunningham et al. claim that the The customer may be able to deal with these
Internet is perceived to be riskier than the tra- annoyances, but sometimes s/he may not be able
ditional service (Tan, 1999; Cunningham et al., to solve them. In particular, the traveller may
2004). They explain this risk premium for Internet feel abandoned and lost in a foreign and distant
airline reservations by the high probability that destination. At the end of the day, even though
users will make mistakes such as double booking, the customer might have been able to deal with
poor seating choices, failure to obtain electronic a minor problem, s/he may have experienced
receipts or timely delivery of ticket, or paying different kinds of risk: psychological, time loss
too much for a non-transferable, non-refundable and even financial annoyances. What if the travel
ticket. Moreover, the sole blame for the mistakes agency could be helpful? How valuable would it
falls on the consumer, who has very limited re- be? Would it be considered as a perfect “after-
course for correcting errors. For Internet shoppers sales” service? Would the consumer be willing
information plays a key role, since information to pay for it? As an upfront payment?
search is more effective at reducing perceived risk
levels. In favour of the Internet it was revealed
that Internet shopping technologies offer a reduc- a caSe Study reSearch
tion in the anxiety caused by judgmental service conducted In the conteXt
representatives (Meuter et al., 2000). of the SWISS travel
“Mistakes are an unavoidable feature of all agency InduStry
human endeavor and thus also of service deliv-
ery” (Boshoff, 1997). Nevertheless, Bitner et al. The travel agency industry in Switzerland is
(1990) showed that it is not necessarily the fail- made up of a few big players such as Kuoni and
ure itself that leads to customer dissatisfaction. Hotelplan and a myriad of small companies, as
What is more likely to cause dissatisfaction is an well as pure Internet players and brick-and-click
inadequate response or a lack of response from companies. The range of activities varies depend-
the company. Mayer et al. (2003) showed that the ing on whether the companies consider themselves
customers feel that how they were treated during as tour operators or retailers or both. Nowadays
the process is as important as what they actu- its main activity is to retail packaged vacations
ally experienced. They recognize what Grönross or standard components that are described in
(1984) identified as the technical dimension (what brochures distributed by tour operators.
actually happened during service delivery) and as The announcement of the commission with-
the functional component (how the service was drawal was received by the travel agencies as an
delivered). Failure in either dimension is likely unexpected calamity. They moved from a hidden
to lead to low perceived service quality. (or vague) commission to an overt outlay for the
In this chapter we want to emphasize less customer. As customers are not willing to pay this
“serious losses” that we will call “annoyances”. new fee, they buy on the Internet in order to save
In fact, we make reference to a legal term “trivial some money. In Switzerland, only one-third of the
annoyance”, which corresponds to an uncomfort- voyages is still booked through travel agencies
able event that cannot justify any prosecution (www.srv.ch, 2005).
and thus any reparation. For “serious losses” we This crisis could, however, be considered as
can assume that insurances will step in and play an opportunity since clients will be looking for
their role. So an annoyance risk is related to a more value-added services when consulting a
problem of quality. In the case of travel services, travel agent. There is an urgent need for travel
303
Perceived Risk Management
agents to reconsider the offering that should be put 1989). In particular, service-perceived risks and
forward to the client. Opportunities lie ahead: all their management were added as themes in the
the interviewed travel agents told us that clients interview protocol. We also described activities
still came to them because they recognized the by drawing procedures and flow diagrams. Re-
value of their consulting services and the assis- searchers analyzed within-case data and searched
tance they provided. They explained this trend for cross-case patterns, i.e. open, axial and selec-
in broad terms as they found it hard to describe tive coding (Corbin and Strauss, 1990). We then
more precisely the attributes of the specific value decided to study the perceived-risks aspects from
they delivered. the customer point of view. Multiple cases were
When starting our research we wanted to selected as some customers are buying mainly on
investigate through case studies the possibilities the Internet or through travel agencies or both,
of adding and delivering more value in typical depending on what they are buying, or because
service activities. In particular, we were looking they are buying packages or various components,
for a more precise definition of expertise and or both.
experience in knowledge-based services. As these As the risk-management aspects were inves-
questions should be more acute in a crisis con- tigated, we tested whether the categorization of
text, we decided to focus on the travel industry. risk sequence as threat, event, ignorance and
Travel agents were first interviewed with a few damage, and its associated management through
open-ended questions. Interviews were conducted preventative, detective and protective controls
on site in order to observe the settings and gather that were developed within a bank context, could
customer-available information such as brochures, also work in another knowledge-based service
information flyers, price lists. context (Dubosson et al., 2006). Our transcripts
Cases were selected according to the theoreti- recurrently show that perceiving more added
cal sampling approach (Glaser and Strauss, 1967). value is more important than the risks that were
Categories were defined and added throughout perceived by the customer. Customers actually
the research: perceive the Internet as riskier but they prefer to
buy travel services on the Internet as it is seen as
• Independent travel agencies or units which more convenient, as more objective, as a broader
were part of a multi-site group, choice at a better price. These issues were com-
• Retailers, tour operators or both, pared with the literature on service-perceived
• Agencies selling tailored or standard risks and service risk management. We stopped
products, adding cases (about 30 cases) in both contexts
• Generalists or niche players. (providers and customers) when it appeared that
incremental learning was minimal (Glasser and
Multiple cases were chosen for each category Strauss, 1967).
and were interviewed by two investigators. One
researcher was handling the interview questions
while the other recorded notes and observations. the traveler ServIce-
One researcher did not meet the informants and was chaIn: chaIn of ServIceS
kept out of the field in order to keep a more objec- and rISK eventS
tive eye to the evidence (Eisenhardt, 1989).
Investigators took field notes that were then This descriptive part is based on in-depth inter-
discussed in team meetings so they shared thoughts views with fifteen consumers and fifteen travel
and emergent ideas and made sure that data col- agencies. The aim was to sketch the service-chain
lection and analysis overlapped (Eisenhardt, as experienced and felt by consumers. As sug-
304
Perceived Risk Management
gested by Booms and Bitner (1981), in the next purchase decision phase. Most of the interviewees
sections we separated process delivery from pro- acknowledged the fact that the travel agency was
cess assembly. We will first describe the buying a good way of obtaining reliable information, get-
/ designing process, and then the intermediaries ting access to a broad choice, designing complex
involved in the delivery of a travel arrangement travel arrangements, getting an expert insight
and, finally, we explain the annoyances (i.e. risks) about the alternatives and making professional
to be managed. choices (such as schedule, transfer). In most cases,
as customers buy travel services without having
consumer Buying Process: experienced them, travel agencies could be the
designing a trip best way of obtaining the knowledge, experience
and expertise that customers are missing.
The biggest part of the consumer buying process Throughout the buying process, a travel agency
could be handled by the travel agency which could can play the role of discussion partner and therefore
help the customer to design, or could design on it can make the customer more willing to accept
behalf of the customer, the delivery chain that greater risk (Woodside, 1972). This tendency to
would be experienced later by the recipient of accept greater risk after discussion is called the
service. When acting on behalf of the customer, “risky-shift” phenomenon (Pruitt, 1971). This
the travel agency has to be assured that it has a tendency is controversial and some researchers
clear understanding of the customer needs and claim that the customer accepts less risk after
expectations. group discussion for high-risk products (Johnson
On the continuum of evaluation for different and Andrews, 1971; Woodside, 1974).
types of products (Zeithaml et al., 2006), travel We found, based on our transcript analysis
services are considered as an experience-based that customers seem to appreciate travel agents’
service whose attributes can be evaluated only competence but do not seem willing to pay for it.
after purchase and consumption. According to the For instance, some customers gather information
definition of credence-based services, i.e. services from various travel agencies, and then they like
associated with a higher degree of customization going on the Internet and designing their own
and requiring the personal intervention of the package. They feel like creating their own travel
service provider (Guiltinan, 1987), travel agency experience. They believe that most of the jobs
activities could also, in some way, be considered performed by travel agencies could be handled
as credence-based services. As cited by Mitra et by them with the same level of quality and ef-
al. (1999), the variability and the non-standardized ficiency. Even more, by buying on the Internet,
nature of credence services lead to uncertainty some customers think that they can reduce the risk
about the actual cost and product performance of not being properly understood by travel agen-
(Murray and Schlacter, 1990) and make it dif- cies. Some customers believe that travel agencies
ficult for the consumer to evaluate alternatives may not work in their best interest but prefer to
before purchase (Guiltinan, 1987). Mitra et al. sell the highest-margin products.
(1999) claim that high risk credence services are
associated with greater information search and assembling a travel Package:
greater reliance on personal information sources. choosing Intermediaries
This role could be partly fulfilled by a travel agent
or by the Internet. When organizing a journey, one has to make a
Travel agencies could therefore play a key series of decisions. For instance, when you book
role in reducing uncertainty and risk during the a flight, you choose an airline. By opting for an
information search, alternative evaluation and airline, you also opt for a particular route, schedule
305
Perceived Risk Management
and hub, and therefore you pick an airport and all next time. When the travel agency advises the
its services (parking areas, security checks, shops, customer, it cannot be assured that everything
customs, cafés …). so a few decisions made in will go off perfectly. Because of the partnering
the buying process imply a myriad of activities and all the uncontrollable factors, there is a high
involving various companies / organizations and probability that the travel will not turn out as
a lot of subcontractors (see Figure 1). planned and expected. Post-purchase behavior of
When mobilizing a unique expertise, a travel the travel agent is very important for services as
agency could design a customized offer that meets customers will actively participate in the process
or even exceeds the customer expectations. But and experience what was decided and designed in
what if anything goes wrong? The travel package the earlier stages of the buying process.
might have been designed properly: nevertheless,
the customer or one of the chosen business partners uncertainty management
(or an implicitly chosen partner, such as the airport
when you choose a carrier), or some uncontrollable According to the US Department of Transporta-
factors (such as a snowstorm), might cause trouble tion (October 2005), the main complaint catego-
that could be experienced by the recipient of the ries are: flight problems (cancellations, delays),
travel package. The consumer will have to handle oversales, mistakes made in reservations and
either what was categorized as “product-category ticketing, waiting lines, problems boarding the air-
risk” (i.e. travel services) or a “product-specific craft, fares (incorrect or incomplete information,
risk” (Dowling and Staelin, 1994). availability, overcharges, fare increase), refunds,
Customers might be aware of the main deci- luggage (lost, damaged or delayed), customer
sions such as the airline and the hotel, but they service (unhelpful, inadequate meals), mislead-
will experience all the partners involved in the ing advertising. Some events may have severe
delivering of the value chain. They will have to bear consequences; others may only cause trouble,
the consequences of some decisions made even if frustration or anger. Our research confirmed
they were not conscious decisions. When a travel these findings as the main problems experienced
agency recommends the use of a specific provider, by customers. But they also describe less serious
or when a tour operator sells an all-inclusive pack- problems that can be considered as annoyances
age, companies involved in the value-chain are or at least as uncertainties (Figure 2). Most of the
partners in a delivery process that should lead to interviewees did not consider the travel agency
customer satisfaction (see Figure 1). as a way of reducing the risk or minimizing the
Some of the providers might have been negative consequences.
personally experienced by the customer or the According to Heskett et al., perceived risks
travel agency before. Very often, they have not arise in large part from customer insecurity about
been. Even in the former case, as service is het- a lack of control of the process and the absence
erogeneous, it might be different and not as good of tangible clues to the quality of the complex
306
Perceived Risk Management
service being purchased (Heskett et al., 1990). a refund or helping to solve a problem) or the
When traveling, customers may feel insecure as factors that contribute to the risk (or the level of
many questions arise as they go through the de- uncertainty, e.g. receiving correct information or
livery process and many factors or behaviors can increasing tangibility) (Laroche et al., 2003; 2004;
induce uncertainties, discomfort or even hinder Mitchell and Boustani, 1994). Indeed, it has been
customers carrying out the activities as expected found that each product has a set of risks associ-
(Figure 2). Moreover, the lack of information ated with its purchase and each consumer has an
available for making service decisions and the individual risk tolerance which, if exceeded, means
lack of knowledge increase the risk (Bebko, 2000; that one or more risk-reduction strategies will be
Mitra et al.,1999). By not having the knowledge employed to reduce the amount of risk perceived
or the correct answer, the customer feels insecure to a tolerable level (Mitchell, 1998). In the litera-
about the outcome of the process and is therefore ture the commonest risk-reducing strategies are:
forced to deal with uncertainty: and to the extent sales staff knowledge, making services tangible,
that the consumer realizes s/he may not attain all free trials and samples, money-back guarantee,
of her/his buying goals (i.e. fulfil her/his needs celebrity endorsements, favorable press reports,
and wants), risk is perceived (Mitchell, 1998). company and brand reputation.
By developing relevant strategies to reduce
perceived risks, service agents could augment
purchase probabilities (Laroche et al., 2003; 2004). a control SyStem deSIgned
So if service companies want to be perceived as to addreSS the IntangIBle
delivering good value, they have to adopt strate- nature of ServIce rISKS
gies to reduce uncertainties and perceived risk
at the purchase stage. To reduce consumer risk, We tested the framework that was developed in
service companies should implement initiatives a bank context and that suggests decomposing
that directly address the risk (or reduce the adverse the risk sequence into the following steps (TEID
consequences of the adverse outcome, e.g. giving model) (Dubosson et al., 2006):
307
Perceived Risk Management
• Threat (a potential risk that might endanger manage the risk as it is perceived by the client
a bank, e.g. an inflammable Persian carpet (i.e. the perceived risk):
was installed in a customer salon)
• Event (an event related to the threat hap- 1. The management will first design a preventa-
pens, e.g. cigar ashes fall on the Persian tive control. This process has to be performed
carpet and ignite a fire) by each CSR in order to, for instance, define
• Ignorance (or unawareness of the event, the needs, the wants and knowledge for each
e.g. the client and the client adviser have customer. Each client adviser must be trained
already left the salon and are ignoring the and instructed to appraise customer needs.
fact that a fire has started) The internal control only checks that the
• Damage (e.g. fire has time to spread information is properly consigned according
throughout the building) to the policy of the company.
2. The management will then design a detec-
In Figure 3 we attempt to describe the impor- tive control. For instance, even if the CSR
tance of control in order to avoid the contagion of has spent time gathering information from
major risks. Very often major risks result from a the customer in order to define his needs
sequence of minor events (Fragnière and Sullivan, and wants, the designed travel arrangement
2007). The handling of trivial risks might then might not meet the customer needs owing to
prevent a catastrophe occurring. Risk identifica- incontrollable factors (for instance, a storm).
tion should thus be accompanied by the analysis To facilitate the detective control, control-
of the dynamic linkages that exist among risks. lers are in charge of collecting (on a sample
These event-risk chains therefore constitute the basis) feedbacks from clients regarding the
framework of the risk management process. delivery process and the experiences as felt
We thus establish a relationship between a by the customer.
threat and its potential resulting damage. If the 3. The management will finally design a pro-
Internal control system (ICS) shows a lack of mea- tective (or recovery) control. If the first two
sures of prevention, an undesirable event might controls (preventative and detective) were
happen (e.g. lack of due diligence processes). If not effective in preventing the contagion
detection systems are defective or inexistent, the of events (e.g. bad diagnosis of customer
fault may spread within the company (e.g. no ac- needs), the intention is to add another
curate MIS to perform the reconciliation of assets). control step that will mitigate the main
Ultimately, if nobody is aware of the fault and if damage occurrence (e.g. reputation risk).
there is no protective measures (e.g. no insurance For instance, the performance of travel
policy), the “expanding” damage could badly hurt arrangements will be checked on a regular
the company which consequently won’t be able basis, for instance through customer survey,
to reach its objectives. and benchmarked.
308
Perceived Risk Management
the measures which could act as preventative, In the bank context we already had the oppor-
detective and curative controls (Figure 4). Indeed tunity to recommend and monitor the implemen-
simpler, though very effective, controls can be tations of such controls (involving a sequence of
set up upstream and risk management could be preventative-detective-curative controls) that were
ex ante instead of ex post. formalized with the help of tools like fault-tree
The travel agent (Figure 4 and Figure 5) could analyses developed by engineers. This approach
then design new service offers based on these could be applied to all service activities and
controls, such as a basic formula with a very extended to the management of perceived risks
cheap fee and a basic risk management with low as experienced by the customers. This approach
assurance as opposed to a premium formula. The could also help service companies to make more
present pricing scheme adopted by the travel in- tangible the activities that they could perform in
dustry that was sometimes considered unfair, as it favor of their customers.
was charged with no link to the service provided Having and using the right information at
to the client, could therefore be replaced with a each step of the internal control system is critical.
new pricing scheme including different risk man- Controllers need to identify, analyze, evaluate
agement levels and assurances corresponding to and record sufficient information to perform their
different fees. For instance, a premium package job. Risk-spreading might be the result of a lack
could include services such as calling the customer of information, such as a lack of upward com-
2 hours before flying, checking and preventing munication (i.e. gap one) (Zeithaml et al., 2006).
overbooking and booking a new flight in case of Poor control could also result from too much
missed connections. Using this approach, service information, implying that the right information
companies could design new service offers and is lost somewhere within the organization. Owing
deliver more added-value. This value would then to ICT tools and systems, misleading information
be recognized as such by the customers, who could will be forwarded as efficiently as true informa-
be willing to pay for it. tion (i.e. ephemeralization phenomenon) and there
309
Perceived Risk Management
will be an increasing number of unanticipated ing precisely what is missing, and thus feel a loss
or unintended side-effects (Heylighen, 2002). of control (Wurman, 1990).
This leads to a greater difficulty in prediction ICS would have to be designed to deliver
and control of the overall effects of any event or sufficient right information and not too much
process. As cited by Heylighen, the result of “data information. It also has to deliver objective (for
smog” is that an individual will not only miss out instance, specification compliance) and subjective
on potentially important information but also be data (such as risks-related customer perception
aware that something is missing, while not know- feedbacks).
310
Perceived Risk Management
311
Perceived Risk Management
a time-spent basis (for instance, a consultant day Debely, J., Dubosson, M., & Fragnière, E. (2006).
or a lawyer hour). It has now to be tested further The Travel Agent: Delivering More Value by Be-
in terms of its validity and the conditions in which coming an Operational Risk Manager. InProceed-
it does and does not work well. ings of the Lalonde 9th International Research
Seminar in Service Management, 178-203.
Debely, J., Dubosson, M., & Fragnière, E. (2007).
referenceS
The Pricing of Knowledge-based services: In-
Bebko, C. P. (2000). Service intangibility and sights from the Environmental Sciences, New
its impact on consumer expectations of service Delhi 2nd International Conference on Services
quality . Journal of Services Marketing, 14(1), Management. Retrieved from http://ssrn.com/
9–26. doi:10.1108/08876040010309185 abstract=951651
Bettman, J. R. (1973). Perceived risk and its com- Dowling, G. R., & Staelin, R. (1994). A model
ponents: A model and empirical test . JMR, Jour- of perceived risk and risk-handling activities .
nal of Marketing Research, 10(May), 184–190. The Journal of Consumer Research, 21(June),
doi:10.2307/3149824 119–134. doi:10.1086/209386
Bitner, M. J., Booms, B. H., & Tetreault, M. S. Dubosson, M., Fragnière, E., & Millet, B. (2006).
(1990). The service encounter: Diagnosing favor- A Control System Designed to Address the Intan-
able and unfavorable incidents . Journal of Market- gible Nature of Service Risks. In Proceedings of
ing, 54(January), 71–84. doi:10.2307/1252174 the Shanghai IEEE International Conference on
Service Operations and Logistics and Informatics
Booms, B., & Bitner, M. J. (1981). Marketing (June), 90-95.
strategies and organization structures for service
firms, In J. Donnelly and W. George (Eds), Market- Eisenhardt, K. M. (1989). Building theories from
ing of Services, American Marketing Association. case study research. Academy of Management
Chicago, Il. Review, 14(4), 532–550. doi:10.2307/258557
Boshoff, C. R. (1997). An experimental study of Engel, J. F., Blackwell, R. D., & Miniard, P. W.
service recovery options . International Journal (1993). Consumer Behavior, Chicago, IL: Dryden
of Service Industry Management, 8(2), 110–130. Press.
doi:10.1108/09564239710166245 Finn, A. (1985). A theory of the consumer evalua-
Corbin, J., & Strauss, A. (1990). Grounded theory tion process for new product concepts . Research
research: Procedures, canons, and evaluative in Consumer Behavior, 1, 35–65.
criteria . Qualitative Sociology, 13(1), 3–21. Fragniere, E., & Sullivan, G. (2007). Risk man-
doi:10.1007/BF00988593 agement. Boston, MA: Thomson, Glaser, B., &
Cunningham, L. F., Gerlach, J., & Harper, M. D. Strauss, A. (1967). The discovery of grounded
(2004). Assessing perceived risk of consumers in theory: Strategies of qualitative research, London:
Internet airline reservations services . Journal of Wiedenfeld and Nicholson.
Air Transportation, 9(1), 21–35. Grönroos, C. (1984). A service quality model
and its marketing implications . European Jour-
nal of Marketing, 18(4), 36–44. doi:10.1108/
EUM0000000004784
312
Perceived Risk Management
Guiltinan, J. P. (1987). The price bundling of Laroche, M., Bergeron, J., & Goutaland, C.
services: A normative framework . Journal of (2001). A three-dimensional scale of intangibil-
Marketing, 51, 74–85. doi:10.2307/1251130 ity . Journal of Service Research, 4(1), 26–38.
doi:10.1177/109467050141003
Guseman, D. S. (1981). Risk perception and risk
reduction in consumer services, In: J.H. Donnelly, Laroche, M., McDougall, G. H. G., Bergeron, J.,
et al. (Eds). Marketing of Services, Chicago: & Yang, Z. (2004). Exploring how intangibility af-
American Marketing Association. fects perceived risk . Journal of Service Research,
6(4), 373–389. doi:10.1177/1094670503262955
Havelena, W. J., & DeSarbo, W. S. (1990).
On the measurement of perceived consum- Mayer, K. J., Bowen, J. T., & Moulton, M. R.
er risk . Decision Sciences, 22, 927–939. (2003). A proposed model of the descriptors of ser-
doi:10.1111/j.1540-5915.1991.tb00372.x vice process . Journal of Services Marketing, 17(6),
621–639. doi:10.1108/08876040310495645
Heskett, J., Sasser, W., & Hart, C. (1990). Service
Breakthroughs: Changing the Rules of the Game, McDougall, G. H. G., & Snetsinger, D. W.
New York:Free Press (1990). The intangibility of services: measure-
ment and competitive perspectives . Journal of
Heylighen, F. (2002). Complexity and Information
Services Marketing, 4(4), 27–40. doi:10.1108/
Overload in Society: Why increasing efficiency
EUM0000000002523
leads to decreasing control. Draft paper to be
submitted to Information Society, April 12. Meuter, M. L., Ostorm, A. L., Roundtree, R. I.,
& Bitner, M. J. (2000). Self-service technolo-
Horton, R. L. (1976). The structure of decision risk:
gies: Understanding customer satisfaction with
Some further progress . Journal of the Academy of
technology-based service encounters . Jour-
Marketing Science, 4(4), 694–706. doi:10.1007/
nal of Marketing, 64(3), 50–64. doi:10.1509/
BF02729830
jmkg.64.3.50.18024
Jacoby, J., & Kaplan, L. (1972). The components
Mitchell, V. W. (1998). A role for con-
of perceived risk, In: Venkatesan, M. (Ed.), Pro-
sumer risk perceptions in grocery retailing
ceedings of 3rd Annual Conference Association for
. British Food Journal, 100(4), 171–183.
Consumer Research, Chicago, Il, (pp.382-393).
doi:10.1108/00070709810207856
Johnson, D. L., & Andrews, I. R. (1971). Risky-
Mitchell, V. W. (1999). Consumer perceived
shift phenomenon as tested with consumer prod-
risk: Conceptualizations and models . Euro-
ucts as stimuli . Journal of Personality and Social
pean Journal of Marketing, 33(1/2), 163–195.
Psychology, 20(August), 328–385.
doi:10.1108/03090569910249229
Karmarkar, U. S., & Pitbladdo, R. (1995).
Mitchell, V. W., & Boustani, P. (1994). A
Service markets and competition . Journal of
preliminary investigation into pre- and post-
Operations Management, 12(3-4), 397–412.
purchase risk perception and reduction . Eu-
doi:10.1016/0272-6963(94)00014-6
ropean Journal of Marketing, 28(1), 56–57.
Laroche, M., & Bergeron, J. & Goutaland. (2003). doi:10.1108/03090569410049181
C. How intangibility affects perceived risk: the
moderating role of knowledge and involvement
. Journal of Services Marketing, 17(2), 122–140.
doi:10.1108/08876040310467907
313
Perceived Risk Management
Mitchell, V. W., & Greatorex, M. (1993). Risk Roselius, T. (1971). Consumer rankings of
perception and reduction in the purchase of risk reduction methods . Journal of Marketing,
consumer services . Service Industries Journal, 35(January), 56–61. doi:10.2307/1250565
13(October), 179–200.
Ross, I. (1975). Perceived risk and consumer
Mitchell, V. W., & Prince, G. S. (1993). Retailing behavior: A critical review, Conference of the
to experienced and inexperienced consumers: A American Marketing Association, 19-23.
perceived risk approach . International Journal
Slovic, P., & Lichtenstein, S. (1968). Relative im-
of Retail & Distribution Management, 12(5),
portance of probabilities and payoff in risk taking.
10–21.
Journal of Experimental Psychology Monograph,
Mitra, K., Reiss, M., & Capella, L. (1999). 78(November), 1–18. doi:10.1037/h0026468
An examination of perceived risk, informa-
Tan, S. J. (1999). Strategies for reducing con-
tion search and behavioral intentions in search,
sumers’ risk aversion in Internet shopping .
experience and credence services . Jour-
Journal of Consumer Marketing, 16(2), 163–180.
nal of Services Marketing, 13(3), 208–228.
doi:10.1108/07363769910260515
doi:10.1108/08876049910273763
Woodside, A. G. (1972). Informal group influences
Murray, K. B., & Schlacter, J. L. (1990). The
on risk taking . JMR, Journal of Marketing Re-
impact of services versus goods on consumers’
search, 9(May), 223–225. doi:10.2307/3149962
assessment of perceived risk . Journal of the
Academy of Marketing Science, 18(1), 51–65. Woodside, A. G. (1974). Is there a generalised
doi:10.1007/BF02729762 risky shift phenomenon in consumer behaviour?
JMR, Journal of Marketing Research, 11(May),
Parasuraman, A., Zeithaml, V. A., & Berry, L. L.
225–226. doi:10.2307/3150569
(1985). A conceptual model of service quality
audits implications for future research . Journal Wurman, R. S. (1990). Information Anxiety. New
of Marketing, 49, 41–50. doi:10.2307/1251430 York:Bantam.
Park, W. C., Mothersbaugh, D. L., & Feick, L. www.srv.ch (2005, September). Swiss Issues: Le
(1994). Consumer knowledge assessment . The marché des voyages: Entre globalisation et pres-
Journal of Consumer Research, 21(1), 71–82. sion des coûts.
doi:10.1086/209383
Zeithaml, V. A., & Bitner, M. J. (2000). Services
Peter, J. P., & Ryan, M. J. (1976). An investigation Marketing: Integrating Customer Focus across the
of perceived risk at the brand level . JMR, Jour- firms, 2nd ed., New York: McGraw-Hill
nal of Marketing Research, 13(May), 184–188.
Zeithaml, V. A., Bitner, M. J., & Gremler, D. D.
doi:10.2307/3150856
(2006). Services Marketing: Integrating Cus-
Pruitt, D. G. (1971). Conclusions: towards an tomer Focus across the firms, 4th ed., New York:
understanding of choice shifts in group discussion McGraw-Hill
. Journal of Personality and Social Psychology,
20(3), 495–510. doi:10.1037/h0031923
314
315
Chapter 17
Prediction Reliability
of Container Terminal
Simulation Models:
A Before and After Study
Armando Cartenì
University of Salerno, Italy
aBStract
In this chapter attention is focused on the container terminal optimization problem, given that today
most international cargo is transported through seaports and on containerized vessels. In this context,
in order to manage a container terminal it is sometimes necessary to develop a Decision Support System
(DSS). This chapter investigated the prediction reliability of container terminal simulation models (DSS),
through a before and after analysis, taking advantage of some significant investment made by the Salerno
Container Terminal (Italy) between 2003 and 2008. In particular, disaggregate and an aggregate simu-
lation models implemented in 2003 were validated with a large set of data acquired in 2008 after some
structural and functional terminal modifications. Through this analysis it was possible to study both the
mathematical details required for model application and the field of application (prediction reliability)
of the different simulation approaches implemented.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Prediction Reliability of Container Terminal Simulation Models
berthing time of vessels, the resources needed considered within strategic planning. In this case
for handling the workload, the waiting time of an aggregate approach, based on container flows
customer trucks and, at the same time, by reduc- rather than single container movements, could
ing congestion on the roads, at the storage blocks be effective.
and docks inside the terminal, as well as making The existing literature reports approaches
the best use of storage space. Each of these ac- to either managing a container terminal as a
tivities significantly affects port efficiency, with system and trying to simulate all elements or
consequences on the local and global economy managing a sub-set of activities (simultaneously
of the freight transport system. Management of or sequentially following a set hierarchy). The
container terminal operations has thus become main approaches developed are optimization and
crucial to meet container traffic demand both simulation. The first seeks to maximize the whole
effectively and efficiently. terminal efficiency or the efficiency of a specific
In this context, in order to manage a container sub-area (or activity) inside the terminal through
terminal it is sometimes necessary to develop a De- deterministic or stochastic optimization models
cision Support System (DSS), i.e. a mathematical (for a recent review see: Steenken et al., 2004).
model, required both to analyze the actual system Examples of the former approach are in Van
situation (to identify system inadequacies or criti- Hee and Wijbrands (1988), Yun et. Al. (1999),
cal points) and to verify one or more alternative Shabayek et al. (2002) e Murty et al. (2005), where
projects/interventions. Indeed, a crucial element it is developed a decision support system for ca-
in the management process is the simulation of pacity planning of container terminals. Different
the effects or impacts of a project scenario. Most approaches have regarded container storage and
of these impacts can be quantitatively simulated retrieval in the yard operations (Taleb-Ibrahimi et
using mathematical models, which allow us to es- al.,1993), space requirement problems (Kim and
timate system indicators (cost-benefit indicators; Kim,1998), space requirement and crane capac-
multi-criteria indicators, …) without physically ity (Kim and Bae, 1998), re-marshaling strategy
carrying out the hypothesized projects. Although (Zhang et al., 2003) and storage space allocation
much work has been done in this direction, the (Zhang et al., 2002; Cheung and Lin, 2002). Re-
prediction reliability of such models remains garding quay-side problems, readers can refer to
uncertain. Wilson (2001) and Avriel et al. (1998) for stowage
Design and project appraisal of container ter- of vessels, and to Chen et al. (2002), Imai et al.
minals can be carried out through disaggregate (1997, 2001), Lau et al. (1992) and Nishimura et
models (sometimes termed microscopic models) or al. (2001) for berth allocation. The most followed
aggregate models (sometimes called macroscopic approaches are based on deterministic optimiza-
models). The main advantage of the disaggregate tion methods. Recently a stochastic optimization
approach is that it allows a detailed analysis in model have been proposed for maximize terminal
which each activity is analysed. Of course this efficiency (Murty et al., 2005).
approach may lead to computational problems and An effective, stimulating alternative approach
is rather computer demanding, especially when to container terminal system analysis may lie in
the resulting models are to be used to support discrete simulation, which is the subject of this
optimization. It seems better suited to operative chapter. Although numerous efforts to simulate a
planning or operations management. On the other container terminal have been made, most papers
hand, decisions about the container terminal con- fail to adequately address model set-up, calibration
figuration regarding type and amount of handling and validation (see e.g. Koh et al., 1994; Yun, Choi,
equipment, berth and yard layout, etc. are better 1999; Shabayek, Yeung, 2002; Kia et al., 2002;
316
Prediction Reliability of Container Terminal Simulation Models
Lee, Cho, 2007), and only focus on the application and seldom the model parameters (random variable
and/or comparison of design scenarios. Moreover, characteristic parameters) are published.
none of them propose before and after analysis to With respect to the crane loading/unloading
simulate the model’s transferability and/or reli- activities, the models proposed are often stochastic
ability. Yun and Choi (1999) propose a simulation (except to the models proposed by Thiers (1998),
model of the container terminal system of the Pusan Tugcu (1983), KMI (2000) and Bielli et al. (2006))
east container terminal. The model is developed with different aggregation levels; the main random
using an object-oriented approach and estimates variables used are:
container terminal performances. Shabayek and
Yeung (2002) propose a simulation model to • crane operation time
analyze the performance of Hong Kong’s Kwai ◦ Exponential (Yun, Choi (1999); Lee,
Chung container. The approach provides good Cho (2007));
results in predicting the actual operation system of ◦ Triangular (Lee, Cho (2007);
the container terminals. Recently Petering (2009) Merkuryeva et al. (2000));
considers the block widths ranging problem in a ◦ Normal (Parola, Sciomachen
marine container terminal by a fully-integrated (2005));
discrete event simulation model. ◦ Uniform (Merkuryeva et al. (2000));
In a simulation model, a handling equipment • crane cycle times
model (sometimes called cost function or per- ◦ Weibull (Koh et al. (1994));
formance function) is assigned to each activity • vessel cycle times
considered in order to estimate the time required to ◦ Normal (Choi (2000));
bring one or more activities to a close (sometimes ◦ Erlang (El Sheikh (1987); Kia et al.
termed: activity time duration). For the author of (2002); Shabayek, Yeung (2002));
this chapter, the definition, the estimation and the
validation of the these models play a relevant and Regarding crane speed, only deterministic
a crucial role for the implementation of a container model are proposed (Yun, Choi (1999); Choi
terminal simulation model. (2000); KMI (2000); Legato et al. (2008); Tugcu
A handling equipment model can be assumed (1983); Koh et al. (1994); Thiers (1998)).
deterministic or stochastic. In the former case With respect to other handling equipments,
represent the average time required to bring an Shouridis and Angelides (2002) publish the
activity (e.g. average crane loading time); in the deterministic values estimated for the Straddle
latter case a random variable should be calibrated Carriers while Merkuryeva et al. (2000) propose
in order to model the activity time duration uncer- to use a Tringular r.v. for estimate the Forklift
tainty. From this point of view, in literature sel- loading/unloading time.
dom this problem is investigated and few authors The different level of aggregation and the dif-
propose the models, deterministic or stochastic, ferent activity time duration object of the estima-
estimated and the characteristic parameters of tions make difficult to compare these models.
these models. This chapter investigates the prediction reli-
Classifying the container terminal activities ability of container terminal simulation models,
with respect to the handling equipments that carry through a before and after analysis. This kind of
out the activities, we observe that the main papers analysis is particularly suitable for model vali-
report deterministic or stochastic models often dation. In particular, the model is implemented
referred to aggregate activities (no distinction (specified and calibrated) through a sample related
among container typology: 20’/40’, full/empty) to an actual scenario, and is validated through
317
Prediction Reliability of Container Terminal Simulation Models
its capacity to reproduce the data related to an The proposed model system allows terminal
after scenario (after some significant system performance to be measured, and two main ap-
modification). plications may be carried out: (i) cost analysis in
This analysis was made taking advantage of order to identify terminal critical points, and (ii)
some significant investment made by the Salerno scenario analysis in order to simulate the feasibil-
Container Terminal (Italy) between 2003 and ity, effectiveness and efficiency of hypothetical
2008. In particular, the disaggregate and aggre- scenarios due to supply system modifications.
gate simulation models (see Cartenì et al., 2005 The chapter is divided into three sections: in
and de Luca et al., 2008) implemented in 2003 the first the model architecture is described; in
(before scenario) were validated with a large set the second results of the model application are
of data acquired in 2008 after some structural and given; the third draws some conclusions from
functional terminal modifications (after scenario). the study.
Through this analysis it was possible to study both
the mathematical details required for model ap-
plication and the field of application (prediction model archItecture
reliability) of the different simulation approaches
implemented. In this chapter a disaggregate simulation model
This chapter also reports the conclusions of a was compared with an aggregate one. In general
research project for container terminal analysis it is possible to group the simulation approaches
starting in 2003. The research project was broken into disaggregate and aggregate models, for each
down into three main steps: of which both advantages and disadvantages can
be identified:
1. methodological issues
◦ different approach identification • disaggregate approach
◦ model architecture identification; advantage: allows detailed analysis in which
◦ model specification; each single activity and container movement is
◦ definition of decision variables; explicitly modeled;
◦ specification of performance disadvantages: large simulation time and
indicators; extensive data required for model parameters
2. applications estimation;
◦ test-site choice; • aggregate approach
◦ survey to calibrate the model advantage: low implementation costs and
parameters; data; these tools allow decisions about the con-
◦ actual scenario simulation; tainer terminal configuration regarding types and
◦ hypothetical scenario simulation, quantities of handling equipment, berth and yard
models comparison and economic layout, etc.
validation; disadvantage: works in a coarser way, where
◦ hypothetical scenario realization; basic variables are container flows moving rather
◦ before and after analysis; than single containers; no detailed analysis is
3. conclusions possible.
◦ guidelines for applications: strengths, The model parameters to be calibrated are
weaknesses, fields of application those of the handling models (deterministic or
for each approach, most effective stochastic) associated to the activities identified.
indicators. Obviously the number of parameters depends on
318
Prediction Reliability of Container Terminal Simulation Models
the simulation approach; disaggregate approaches • the quantity of handling equipment avail-
generally require a larger number of parameters able per type: for example, {reach stacker,
than the aggregate one. fork lift, front loader, straddle carrier ….};
Container flows moving to/from vessels, yards • the starting system configuration, say at the
and gates are generally known exactly, since they initial time (any terminal activity at the ini-
are a priori known and independent of any varia- tial time could influence indicator values).
tions in any characteristic of the model system
(rigid demand hypothesis). Furthermore, the quantity of handling equip-
Two sample data sets are required for model ment available per type is a function of the starting
application: one for model parameter estimation system configuration (for example the average
and another (hold-out sample) used for model quantity of handling equipment per vessel is a
validation. To validate the model many perfor- function of the number of vessels loading/un-
mance indicators (measures) can be estimated, loading).
such as: Estimation of performance indicators are also
useful for planning investments for a container
• global indicators, if referring to the con- terminal through a what if approach by comparing
tainer terminal as a whole; different project scenarios. Global indicators are
◦ average crane hours per working generally used to assess the benefits of long-term
hour; investments; while local indicators are used to
◦ average vessel time at berth; assess the benefits of medium/short-term invest-
◦ average employees per vessel per ment and for real-time applications.
shift; The model approaches implemented in this
◦ total crane cost per crane/hour; research project are as follows:
◦ average fraction of time workers are
idle; • a discrete event model as a disaggregate
◦ …; approach;
• local indicators, if referring to specific se- • a diachronic capacitated flow network
quences of activities (or single activities); model as an aggregate approach.
◦ vessel average load/unload time;
◦ container average transfer and/or A Container Terminal (CT) can be divided
storage time; into: gate, yard, and berth subsystems. Container
◦ …. handling equipment (sometimes called handling
units) comprises storage (yard) cranes, loading/
Both types of indicators may be expressed in unloading (berth) cranes, yard tractors, trailers,
different units, the most widely used being time reach stackers, shuttles … . Management of a CT
(e.g. vessel unloading time) or number of opera- consists in berth planning, yard planning, storage
tions per time period (e.g. number of movements planning and logistics planning. Berth planning
per day); other units may be used such as cost per refers to planning/monitoring of the loading or un-
time period. loading. Yard planning refers to optimal container
In general, a performance indicator is a func- allocation to the storage areas (import, export and
tion of: transshipment). Storage planning concerns storage
location in the vessel bay, and logistics planning
• the number of containers per type: {20’, regards container handling operations between
40’} × {full, empty} × {reefer, non- the vessel’s bay and the yard. After preliminary
reefer}; identification of all system elements (cited above),
319
Prediction Reliability of Container Terminal Simulation Models
for each activity input variables, constraints and The basic structure of a discrete event simu-
relationships are identified. lation model consists of various elements, each
Following the general approach of transporta- of which represents a container terminal activity
tion system analysis, a container terminal can be (for all details see Cartenì et al., 2005). The con-
broken down into two main components: supply nections of the whole system can be represented
and demand. The supply sub-system is the set of as an oriented graph, where nodes correspond to
facilities, services and regulations which allows significant activities, links represent node con-
containers to move inside the terminal, and the nections and paths are a sequence of activities;
demand sub-system is represented by container in our case study, containers move along a path
flows moving to/from vessels, yards and gates. (see the example in figure 1).
In the next sections details on supply and demand The graph contains both origin and destination
models are reported; for a full description see centroid nodes; an origin centroid node repre-
Cartenì et al. (2005) and de Luca et al. (2008). sents the physical point of container origin (for
example: the gate-in for export macro-activity or
discrete event Simulation the vessel hold for import macro-activity), while a
model: Supply model destination centroid node represents the physical
point of destination (for example: the gate-out
Discrete event simulation appears one of the most for import macro-activity or the vessel hold for
effective approaches to analyze complex systems, export macro-activity).
and the most recommendable method to analyze A handling equipment model is assigned to
a container terminal system in detail. A discrete each node (activity) in order to estimate the time
event system is a dynamic system, whose states required to bring one or more activities to a close.
(possibly also described by logical variables) The time instant at which each activity occurs is
may change each time an event (in a pre-defined explicitly taken into account.
set) occurs. The sequence of events describes As said, a handling equipment model can
system evolution over time (clearly in discrete be assumed deterministic or stochastic. In the
a-periodic time). former case represent the average time required
320
Prediction Reliability of Container Terminal Simulation Models
to bring an activity (e.g. average crane loading which also expresses the consistency relationships
time); in the latter case a random variable should between path or link and performances or flows.
be calibrated in order to model the activity time The graph is used to simulate the main activities
duration uncertainty. of a container terminal, each being represented
The model architecture proposed is able to by a link, while positions in space and/or time
simulate three macro-activities: import, export are represented by nodes. Each link generally
and transshipment. Through the proposed ar- has an associated handling equipment model
chitecture it is possible to jointly simulate these relating link activity time duration to link flows
macro-activities that influence each other, since (in TEUs per time unit) and a handling capacity
they compete for common resources. Simulation as the maximum number of containers (per time
of this reciprocal effect allows the sharing of unit) that can be handled.
infrastructures (e.g. handling equipments, yards, Due to the discrete and dynamic nature of the
terminal roads) to be explicitly simulated. system, the graph used to simulate services and
their time distribution is a space-time or diachronic
diachronic capacitated flow graph (see the example in figure 2). Activities
network model: Supply model regarding physical container movements (for
example vessel loading by crane; shuttle transfer;
With respect to the proposed aggregate approach container storage) may be termed handling links
the supply model consists of a network model and containers waiting without any physical move-
(for all details see de Luca et al., 2008). The ment such as waiting for the next crane service
connections are represented by an oriented graph may be termed waiting links.
321
Prediction Reliability of Container Terminal Simulation Models
At the same time, it is possible to define vari- tion nodes. Thus a path model is a sequence of
ous nodes: origin centroid nodes (defined above); activities that occurs within a specific operation.
origin temporal nodes; activity nodes; temporal Generally, several paths connect the same origin-
destination nodes and destination centroid nodes destination pair, and also a pair of origin temporal
(defined above). and (successive) destination temporal nodes.
An origin temporal node represents the first
instant in which a container flow seeks to enter demand model
the system (gate in, vessel, yard) and to start its
trip towards the final destination (gate out, vessel, The demand sub-system, as previously introduced,
yard). A demand flow will be associated to each is represented by container flows moving to/from
temporal node. The space coordinate is the same vessels (quay-side), yards and gates (land-side).
as the corresponding origin centroid, while the For each macro-operation (import, export, trans-
time coordinate depends on a time interval, thus shipment), the demand flows may be characterized
on the chosen time simulation segmentation (Δτ). over space, time and type. As regards spatial char-
As a consequence, we will have as many tempo- acterization, container flow can be subdivided by
ral centroids as there are simulation segments. zone of origin and destination and can be arranged
For instance, if the simulation lasts 6 hours (360 into Origin-Destination matrices (O-D matrices).
minutes) and the chosen time interval is Δτ = 10 In particular, for each operation we can distinguish
minutes, we will have 36 temporal centroids. macro-origin and macro-destination zones (ves-
The connection between two successive origin sels, yards, gates) and for each of them different
temporal centroids is represented by a waiting zones may exist. The O-D matrices have a number
link; this means that, in a current time interval, of rows and columns equal to the number of zones
there is not enough handling capacity to allocate (represented by centroids in the graph).
all demand flow towards the node. In this case In order to carry out the simulation, each de-
the excess demand flow has to wait for the next mand flow should be characterized through its
time slot before entering the system. The origin distribution over time, that is, over the chosen
temporal node is also connected to an activity node time segmentation. In general, it is assumed that
through a handling link. All the activity nodes the demand profiles are a priori known and inde-
represent the start and end of activities occurring pendent of any variations in any characteristic of
inside a container terminal. An activity node from the supply system (rigid demand hypothesis). The
which a container terminal cannot proceed further demand profiles are based on empiric observations
is called a temporal destination node. and can be assumed deterministic or stochastic.
From an activity node the container flow can In the latter case a random variable should be
directly continue its transfer towards its destina- calibrated in order to model the uncertainty of
tion, or has to wait for the next time slot to be served container flow arrivals (for example truck TEU
(handled). In the first case the activity node will be arrivals at the gates). Finally, different O-D matri-
connected through a handling link with a further ces should be estimated for each type of container
activity node representing the next activity; in the (20’ vs 40’, full vs empty).
second case the activity node will be connected, The origin-destination flows for each time
through a waiting link, to the homologous node to instant (disaggregate approach) or time interval
the next time slot. This process is repeated until a (aggregate approach) are assigned to the avail-
destination temporal node is reached. able paths. The flows obtained allow link flows
In such a network, a path is a sequence of to be estimated.
adjacent links connecting the origin and destina-
322
Prediction Reliability of Container Terminal Simulation Models
323
Prediction Reliability of Container Terminal Simulation Models
• aggregate O-D matrices per time period ◦ Sample Mean Container Type
(undifferentiated by container type); (SMCT) models (20’ full and/or
• disaggregate O-D matrices per time period empty; 40’ full and/or empty; 2 x 20’
and type of container (20’, 40’, 2x20’, full, full);
empty). • random variable as representative of activ-
ity time duration
To specify the supply sub-system all the ◦ Random Variable Undifferentiated
facilities, services and regulations which allow (RVU) model (undifferentiated per
containers to move inside the Salerno terminal container type);
were identified. According to the model archi- ◦ Random Variable Container Type
tecture introduced in section 2 both the aggregate (RVCT) models (20’ full and/or
and disaggregate graphs were implemented. For empty; 40’ full and/or empty; 2 x 20’
complete characterization of the supply models full).
(aggregate and disaggregate) the handling equip-
ment models were estimated. In particular, three The analyses are divided into a preliminary
handling equipment types were simulated with descriptive analysis of experimental data and
many activities: statistical analysis. In the descriptive analysis, the
mean values and corresponding standard deviations
• Mobile Harbour Crane (MHC) are estimated. Such values are useful to develop/
◦ loading time from dock to vessel implement models based on sample mean variables,
◦ loading time from shuttle to vessel and allow the need for a stochastic approach to be
◦ unloading time from vessel to dock appreciated. By contrast, statistical analysis aims
◦ unloading time from vessel to shuttle to estimate the theoretical continuous cumulative
• Gantry Crane (GC) distribution function FX(x;θ) that best fits the sample
◦ unloading time (to shuttle/truck) distribution function Fsample(x; n). Given a sample
◦ loading time (from shuttle/truck) x = (x1, …, xn), with mean‾x and variance s2, the
◦ unloading time (to stack) Kolmogorov-Smirnov with respect to a random
◦ loading time (from stack) variable X with parameters θ is the statistic used to
◦ trolley speed (with container) evaluate the quality of the estimation methodology
◦ free trolley speed and the random variable tested:
◦ crane speed
• Reach Stacker (RS) Dn = sup | Fsample(x; n) − FX(x;θ) | = Dn,X(θ)(x)
◦ unloading time from shuttle/truck
◦ loading time to shuttle/truck For large values of n, Smirnov (1948) gives
◦ stacking time (to tier) the limiting distribution of Dn⋅n1/2. Hence it is
possible to compute the critical values dn,α (the
For each single activity four different handling thresholds) for large samples (n>35):
models were estimated:
− dn,α = 1.3581 / n1/2 for α = 0.05
• sample mean as estimation of activity time
duration; − dn,α = 1.6276 / n1/2 for α = 0.01
◦ Sample Mean Undifferentiated
(SMU) model (undifferentiated per For smaller sample sizes the critical values are
container type); estimated in Miller (1956).
324
Prediction Reliability of Container Terminal Simulation Models
The Kolmogorov-Smirnov statistic with respect nificant. The three random variables produce Dn
to two sample distributions is the statistic used values below the thresholds; however, Dn values
to evaluate whether two sample distributions related to the Gamma random variable may be
are statistically equal. This statistic was used to observed often below the others.
evaluate whether sample distributions related to We can therefore conclude while the three
similar activities are equal (for example if the random variables could all be used to represent
sample distribution of the 20’ full container loading the time duration of the main container terminal
time is equal to that of the 20’ empty container handling activity, the Gamma random variable
loading time). produces the best results.
Two estimation methods were compared: Mo- In Figure 3, Figure 4 and Figure 5 estimation
ment estimation and Maximum Likelihood (M-L) results are reported.
estimation (see for example Jonson et al., 1994).
Several variables (exponential, log normal …) model validation
were tested for each activity involved and for dif-
ferent container types. The estimation results show The model was validated in two subsequent steps.
differences in terms of parameter value variables First, model outputs were compared with the data
between 0.5% and 12.0%. From a statistical point surveyed in 2003 in the container terminal in order
of view, M-L estimations show the best results. to ascertain the suitability of the model for repre-
Furthermore, sometimes the Moment Dn values senting real conditions. Secondly, model outputs
are greater than the corresponding thresholds were compared with the data of a hold-out sample,
dn,α. These results suggest we should prefer M-L that is a sample of data acquired in 2008 not used
model estimation. for model parameter estimation (see the next sec-
Comparison among different models (random tion). To validate the model both global and local
variables) showed that only Normal, Gamma and performance indicators were estimated:
Weibull random variables were statistically sig-
325
Prediction Reliability of Container Terminal Simulation Models
326
Prediction Reliability of Container Terminal Simulation Models
◦ average fraction of time workers are which points to a relatively high efficiency of
idle; crane usage. The observed vessel average time
◦ total crane cost per crane/hour; at berth is about 12 hours; for each vessel the
◦ worker cost/hour per crane; average number of workers per vessel and per
• local performance indicators shift is about 11; the estimated fraction of time
◦ handling equipment indicators; that workers are idle is about 9%.
▪ vessel loading and/or unloading With respect to the economic global indicators,
time; the total worker cost per hour and per vessel is
▪ quay/yard crane idle time; about 367 €/hour; the worker cost per hour and
▪ shuttle waiting time; per crane is about 25 €/hour; while the total crane
▪ shuttle transfer time; cost per crane and per hour is about 36 litres of
▪ reach stacker stacking time; fuel consumption.
▪ reach stacker idle time; In table 2 results in terms of absolute percent-
▪ gate in/out waiting time; age estimation error are reported. Obviously not
◦ container indicator; all the performance indicators could be estimated
▪ container operation time: time for all the approaches implemented; for the ag-
required to move a container gregate approaches the local indicators related
with handling equipment (e.g., to the single container cannot be estimated due
time spent moving a container to the aggregate nature of the model. However,
from quay to vessel or from even if the nature of the disaggregate approach
shuttle to stack). allows us to simulate both disaggregate and ag-
gregate indicators, the high costs (in terms of
The choice of these indicators was determined monetary cost, data required and simulation time)
by the type of data measured by the terminal of model implementation suggested implementing
monitoring office. Since the output of stochastic a disaggregate model able to simulate the daily
simulation may be considered a realization of a
stochastic process (the time associated to each
single activity is the realization of a random vari- Table 1. Global performance indicators
able), the values used for calibration are obtained
by determining the average of 25 simulations (see global performance indicator observed data
Law and Kelton, 2000, about the “replication/ average container dwelling time 7 days for export opera-
tion
deletion approach” for calculating the number 14 days for import
of simulations required to obtain an estimate of operation
12 days for transhipment
the sampling average with a fixed interval of operation
reliability). average crane hours per working 0.85
In table 1 the values of global indicators are hour
reported in terms of observed data. As can be vessel average time at berth 12 hours
seen, for the Salerno Container Terminal we have average number of workers per 11
an average container dwelling time of 7 days for vessel per shift
export operations, 14 days for import operations fraction of time workers are idle 9%
and 12 days for transhipment operations. With total crane cost per crane / hour 36 litres / hour
(liters of fuel consumption)
respect to the crane global indicators we observe
worker cost/hour per crane 25 € / hour
an average crane hours per working hour of 0.85
total worker cost/hour per vessel 367 € / hour
327
Prediction Reliability of Container Terminal Simulation Models
performance of the Salerno terminal. This time percentage errors for handling equipment indica-
interval does not allow estimation of the global tors are more than 6% with the RVU handling
indicators proposed, which is why simulation of model, and about 3% with Random Variable
more than one day consecutively is required. Container Type (RVCT) handling models. With
With respect to the aggregate approach, the respect to container indicators, when only using
simulation results show simulation times lower the RVCT handling models the absolute per-
than 12 seconds. Results in terms of global in- centage estimation error is acceptable (>11%);
dicators show an average absolute percentage in all the other cases the estimation errors are
error of more than 10% for the aggregate model about 30%.
with the Sample Mean Undifferentiated (SMU) In conclusion, the disaggregate approach is
handling model, whereas in using the Random particularly suitable for local indicator estima-
Variable Undifferentiated (RVU) handling model tion. Results differ according to the handling
the percentage estimation error is lower than 5%. models used; Sample Mean models could be
With respect to the handling equipment local used for estimating handling equipment indica-
indicators, the SMU handling model produces tors, with absolute percentage errors of 11%-
an estimation error of more than 18% while the 13%; using Random Variable handling models
estimation error of the RVU handling model is for estimating handling equipment indicators,
just over 4%. Hence the aggregate approach using absolute percentage errors decrease to 3%-6%.
Sample Mean handling models can be used only To estimate container movement performance
for global indicator estimation while Random (container indicators) only the RVCT handling
Variable handling models generate good results models can be used.
also in terms of handling equipment indicator From the model validation results we may
estimations. obtain the following application guidelines:
With respect to the disaggregate approach the
use of Sample Mean handling models does not • due to the high implementation costs, ap-
produce very good results in terms of local indi- plication of the disaggregate approach
cators; average percentage estimation errors are is convenient (from a cost-benefit point
more than 11% for handling equipment indicators of view) only for estimating disaggre-
and about 30% for container indicators. gate performance indicators (especially
Results obtained using Random Variable for the simulation of the single container
handling models are significant; average absolute movement); by contrast, due to the lower
328
Prediction Reliability of Container Terminal Simulation Models
implementation costs the aggregate ap- reported (results related to the other performance
proach should be used for all aggregate indicators and referred to the diachronic capaci-
performance indicator estimation (espe- tated flow network model are analogous).
cially for simulating global container ter- With respect to the gate-in activity, the truck
minal performance and at times for equip- waiting time (queue waiting time plus service
ment performance estimation); time) percentage variation was estimated with
• the choice of the handling model disaggre- respect to the service time percentage variation;
gation level and the stochastic/determinis- the simulation results show an expected decrease
tic nature of the phenomenon play a major benefit effect; in particular, -10% of service time
role in model application; if the object of produce about -35% of truck waiting time; -20%
the simulation is estimation of global con- of service time produce about -55% of waiting
tainer terminal performance, Sample Mean time while -30% of service time produce more
Undifferentiated handling models should than -70% of waiting time.
be used; while if single container move- With respect to the vessel loading time, one of
ment has to be simulated, the only suit- the main critical point of the Salerno terminal is
able handling models are Random Variable the low arrival frequency of the shuttles near the
Container Type models (20’ full and/or vessels; for this reason, a crane number increase
empty; 40’ full and/or empty; 2 x 20’ full not produce great reduction in term of vessel load-
and/or empty). ing time (see figure 6); instead, a shuttle leg time
reduction produce significant vessel loading time
To evaluate the model’s sensitivity, the percent- variation (e.g., -30% of shuttle lag time produce
age performance indicators variations with respect about -30% of vessel loading time). This phenom-
to the input variables percentage variations (e.g., ena is verified till the crane capacity is reached;
percentage variation of equipment numbers or of then only a combined increase of crane number
equipment performances) were estimated. In fig- with the shuttle lag time could further increase
ure 6 some representative results obtained with the the performance of the loading activity.
discrete event simulation model implemented are
Figure 6. An example of model’s sensitivity: vessel loading time and gate in waiting time variation (re-
sults of discrete event simulation model)
329
Prediction Reliability of Container Terminal Simulation Models
Before and after analysis The choice of which project scenario to im-
prove was made through economic evaluation (see
As said, this chapter investigates the prediction figure 7). For all the project scenarios, variations
reliability of container terminal simulation models, in performance indicators with respect to the 2003
through a before and after analysis. scenario were estimated. In particular, both the
This kind of analysis is particularly suitable for aggregate model (with Sample Mean Undifferenti-
model validation; in particular, the disaggregate ated handling models) and the disaggregate one
and aggregate simulation models implemented (with Random Variable Container Type models)
in 2003 (before scenario) were validated with were used. The first model was used to evaluate
a large set of data acquired in 2008 after some global indicators while the second was used to
structural and functional terminal modifications estimate the local indicators introduced above.
(after scenario). These indicator variations were converted into
Through a what if approach, the model system economic profit (in Euros); for example an hour
implemented was used to identify a sample of of vessel loading saved was converted into Euros
project scenarios which improve the performance saved per vessel hour saved. This profit includes
of the Salerno terminal (with respect to the 2003 all the costs economized such as vessel time at
scenario). A project scenario has some system berth, container dwelling time, number of work-
modifications (e.g., variation in number of cranes ers per vessel per shift and number of shifts per
per vessel; yard layout changes; shuttle lag time vessel.
variation). To identify the choice set some con- The choice of the best project to improve
straints were taken into account, such as budget was made by comparing profits with the costs
availability, terminal layout and handling equip- (in euro) required to modify the system (e.g., the
ment availability. cost of a new crane or changing the yard layout).
330
Prediction Reliability of Container Terminal Simulation Models
Such economic comparisons showed that some • the aggregate approach is useful for ag-
scenarios, in spite of transport benefits, were not gregate performance indicator estimations
economically advantageous since profits were (global indicators), both aggregate and
lower than realization costs (see Figure 7). disaggregate handling models could be
The main characteristics of the project scenario used; this approach, through a what if ap-
chosen are: proach, could be used to assess the benefits
of long-term investments (e.g., a new berth
• a new automated gate in/out with two new or a new automated control system) or to
gates (4 gates in all); assess the benefits of medium-term invest-
• a new yard layout: new location inside the ment (for example a new yard layout or a
terminal and increase in size; new gate in/out);
• a new yard crane (3 in total); • the disaggregate approach is useful for es-
• new shuttle paths from gate to yard and timating disaggregate performance indica-
from yard to berth. tors related to handling equipment, with
possible use of both aggregate and disag-
The data acquired in 2008 related to this gregate handling models; this approach
improved project scenario (as said, not used for could be used to assess the benefits of
model estimation) were compared with the esti- short-term investments (e.g., a new han-
mated ones to test the prediction reliability of the dling equipment or new shuttle paths for
model system implemented. traffic congestion reduction);
Judging from the average percentage prediction • the disaggregate approach with Random
error (table 3), the model system implemented has Variable models handling models dif-
a good capacity to reproduce the data acquired in ferentiated by container type is the only
2008; the aggregate model with SC handling has approach useful for estimating single
an average prediction error of more than 7% in container movement; this approach is par-
terms of global indicators; while the disaggregate ticularly suitable for real-time applications
model with SCT handling models produces an av- (e.g., real-time container flow control or
erage prediction error of about 4% with respect to emergency control).
equipment indicators and about 10% with respect
to container indicators. In conclusion the model
system applied has a good capacity to reproduce concluSIon
the project scenario implemented, confirming the
validation results reported in table 2. This chapter investigated the prediction reliability
The validation results suggest the fields of of container terminal simulation models, through
applications of the model approaches imple- a before and after analysis, taking advantage of
mented: some significant investment made by the Salerno
331
Prediction Reliability of Container Terminal Simulation Models
Container Terminal (Italy) between 2003 and 2008. With respect to the field of application, the
In particular, the disaggregate and aggregate simu- aggregate approach was shown to be useful for
lation models implemented in 2003 (see Cartenì et predictions in terms of aggregate performance
al., 2005 and de Luca et al., 2008) were validated indicators (global indicators); this approach,
with a large set of data acquired in 2008 after some through a what if approach, could be used to as-
structural and functional terminal modifications. sess the benefits of long-term investments or to
Through this analysis it was possible to study assess the benefits of medium-term investment.
both the mathematical details required for model The disaggregate approach was found useful to
application and the field of application (prediction predict the effects of project scenarios in terms
reliability) of the different simulation approaches of disaggregate performance indicators related to
implemented. handling equipments and single container move-
The validation results suggested several guide- ments; this approach could be used to assess the
lines for applications. Due to the high implementa- benefits of short-term investments and is particu-
tion costs, the disaggregate approach application is larly suitable for real-time applications.
convenient (from a cost-benefit point of view) only This kind of Decision Support System (DSS)
for disaggregate performance indicator estimations could be used by a terminal operator seeking to
(especially for simulating single container move- choose the best project to develop and wishing
ments). By contrast, due to lower implementation to maximize firm benefits.
costs the aggregate approach is more suitable for
all aggregate performance indicator estimations
(especially to simulate global container terminal acKnoWledgment
performance and, at times, equipment performance
estimation). Furthermore, choice of the handling Salerno Container Terminal through Antonio Bar-
model disaggregation level and the stochastic/ bara provided most of data and supported the ad
deterministic nature of the phenomenon play a hoc surveys. All the results reported in this chapter
major role in the model application; if the object are the author’s estimations; Salerno terminal is not
of the simulation is to estimate all performance responsible for the values published. The author is
in the container terminal, Sample Mean Undif- grateful to G.E. Cantarella and S. de Luca as part-
ferentiated handling models could be used; while ners of the research project, and Pasquale Modica
if simulation of single container movements is for his assistance in data collection.
required, the only suitable handling models are
the Random Variable models disaggregated by
container type (20’ full and/or empty; 40’ full and/ referenceS
or empty; 2 x 20’ full and/or empty).
Avriel, M., Penn, M., Shpirer, N., & Witte-
The results of this research show that under
boon, S. (1998). Stowage planning for con-
some specific hypotheses a terminal simulation tainer ships to reduce the number of shifts.
model could be used to reproduce a hypothetic Annals of Operations Research, 76, 55–71.
project scenario. The proposed model system al- doi:10.1023/A:1018956823693
lows terminal performance to be measured, and
two main applications may be carried out: (i) cost Bielli, M., Boulmakoul, A., & Rida, M. (2006).
analysis in order to identify terminal critical points, Object oriented model for container terminal dis-
and (ii) scenario analysis in order to simulate the tributed simulation. European Journal of Opera-
feasibility, effectiveness and efficiency of project tional Research, 175, 1731–1751. doi:10.1016/j.
scenarios due to supply system modifications. ejor.2005.02.037
332
Prediction Reliability of Container Terminal Simulation Models
Cartenì, A., Cantarella, G. E., & de Luca, S. (2005). Kim, K. H., & Bae, J. W. (1998). Re-marshaling
A simulation model for a container terminal. In export containers in port container terminals.
Proceeding of the European Transport Conference Computers & Industrial Engineering, 35(3–4),
(ETC) 2005, Strasbourg, France. 655–658. doi:10.1016/S0360-8352(98)00182-X
Chen, C.-Y., & Hsieh, T.-W. (2002, July). A time– Kim, K. H., & Kim, H. B. (1998). The optimal
space network model for the berth allocation prob- determination of the space requirement and the
lem. 19th IFIP TC7 Conference on System Modeling number of transfer cranes for import containers.
and Optimization, Cambridge, UK, 1999. Computers & Industrial Engineering 35(3– 4),
427–430.
Cheung, R. K., Li, C.-L., & Lin, W. (2002). Inter-
block crane deployment in container terminals. KMI – Korea Maritime Istitute (2000). A Study on
Transportation Science, 36(1), 79–83. doi:10.1287/ the System Design and Operations of Automated
trsc.36.1.79.568 Container Terminal. Internal report.
Choi, Y. S. (2000). Simulator for Port Container Koh, P. H., Goh, J. L. K., Ng, H. S., & Ng, H. C.
Terminal Using An Object-Oriented Approach. PhD (1994). Using simulation to preview plans of a
thesis, Quality System Analysis Lab., Industrial container port operations. Proceedings of the 1994
Engineering, Pusan National University. Winter Simulation. Tew, Manivannan, Sadowski,
Seila (Ed.).
de Luca, S., Cantarella, G. E., & Cartenì, A. (2008).
A macroscopic model of a container terminal based Lai, K. K., & Shih, K. (1992). A study of container
on diachronic networks. Schedule-Based Model- berth allocation. Journal of Advanced Transporta-
ing of Transportation Networks. Wilson, Nuzzolo tion, 26(1), 45–60. doi:10.1002/atr.5670260105
(Ed.). Springer.
Lee, S. Y., & Cho, G. S. (2007). A Simulation
El Sheikh, A. A. R., Paul, R. J., Harding, A. S., Study for the Operations Analysis of Dynamic
& Balmer, D. W. (1987). A microcomputer-based Planning in Container Terminals Considering
simulation study of a port. The Journal of the Op- RTLS. IEEE Xplore® digital library.
erational Research Society, 38(8), 673–681.
Legato, P., Gullì, D., Trunfio, R., & Simino, R.
Imai, A., Nagaiwa, K., & Tat, C. W. (1997). Efficient (2008). Simulation at a Maritime Container Ter-
planning of berth allocation for container terminals minal: Models and Computational Frameworks. In
in Asia. Journal of Advanced Transportation, 31(1), Proceedings of the 22th European Conference on
75–94. doi:10.1002/atr.5670310107 Modelling and Simulation (ECMS 2008), Nicosia
(Cyprus), 261-269.
Imai, A., & Nishimurra, E. (2001). Papadimitriou
S. The dynamic berth allocation problem for a Merkuryeva, G., Merkuryev, Y., & Tolujev, J.
container port. Transportation Research Part B: (2000). Computer simulation and Metamodelling
Methodological, 35, 401–417. doi:10.1016/S0191- of logistics processes at a container terminal. Stud-
2615(99)00057-0 ies in Informatics and Control, 9(1), 1–10.
Kia, M., Shayan, E., & Ghotb, F. (2002). Inves- Murty, K. G., Liu, J., Wan, Y., & Linn, R. (2005).
tigation of port capacity under a new approach A decision support system for operations in a con-
by computer simulation. Computers & Industrial tainer terminal. Decision Support Systems, 39(3),
Engineering, 42, 533–540. doi:10.1016/S0360- 309–332. doi:10.1016/j.dss.2003.11.002
8352(02)00051-7
333
Prediction Reliability of Container Terminal Simulation Models
Nishimura, E., Imai, A., & Papadimitriou, S. Van Hee, K. M., & Wijbrands, R. J. (1988).
(2001). Berth allocation in the public berth system Decision support system for container terminal
by genetic algorithms. European Journal of Op- planning. European Journal of Operational
erational Research, 131, 282–292. doi:10.1016/ Research, 34, 262–272. doi:10.1016/0377-
S0377-2217(00)00128-4 2217(88)90147-6
Parola, F., & Sciomachen, A. (2005). Intermodal Wilson, I. D., Roach, P. A., & Ware, J. A. (2001).
container flows in a port system network: Analysis Container stowage preplanning: using search to
of possible growths via simulation models. Inter- generate solution, a case study. Knowledge-Based
national Journal of Production Economics, 97, Systems, 14, 137–145. doi:10.1016/S0950-
75–88. doi:10.1016/j.ijpe.2004.06.051 7051(01)00090-9
Petering, M. E. H. (2009). Effect of block width Yun, W. Y., & Choi, Y. S. (1999). A simulation
and storage yard layout on marine container model for container-terminal operation analysis
terminal performance. Transportation Research using an object-oriented approach. International
Part E, Logistics and Transportation Review, 45, Journal of Production Economics, 59, 221–230.
591–610. doi:10.1016/j.tre.2008.11.004 doi:10.1016/S0925-5273(98)00213-8
Shabayek, A. A., & Yeung, W. W. (2002). A Zhang, C., Liu, J., Wan, Y.-W., Murty, K. G., &
simulation model for the Kwai Chung container Linn, R. J. (2003). Storage space allocation in
terminals in Hong Kong. European Journal of container terminals. Transportation Research Part
Operational Research, 140, 1–11. doi:10.1016/ B: Methodological, 37, 883–903. doi:10.1016/
S0377-2217(01)00216-8 S0191-2615(02)00089-9
Steenken, D., Voss, S., & Stahlbock, R. (2004). Zhang, C., Wan, Y.-W., Liu, J., & Linn, R.
Container terminal operation and operations (2002). Dynamic crane deployment in container
research - a classification and literature review. storage yards. Transportation Research Part B:
OR-Spektrum, 26, 3–49. doi:10.1007/s00291- Methodological, 36(6), 537–555. doi:10.1016/
003-0157-z S0191-2615(01)00017-0
Taleb-Ibrahimi, M., Castilho, B. D., & Daganzo, C.
F. (1993). Storage space vs. handling work in con-
tainer terminals. Transportation Research Part B: Key termS and defInItIonS
Methodological, 27(1), 13–32. doi:10.1016/0191-
2615(93)90009-Y Before and After Analysis: This kind of analy-
sis is particularly suitable for model validation. In
Thiers, G., & Janssens, G. (1998). A Port particular, the model is implemented (specified
Simulation Model as a Permanent Deci- and calibrated) through a data sample related to
sion Instrument. Simulation, 71, 117–125. an actual scenario (actual system configuration),
doi:10.1177/003754979807100206 and is validated through its capacity to reproduce
Tugcu, S. (1983). A simulation study on the deter- the data related to an after scenario (after some
mination of the best investment plan for Istanbul significant system modification) and not used for
seaport. The Journal of the Operational Research model’s estimation.
Society, 34(6), 479–487. Decision Support System (DSS): In the trans-
portation system analysis, a DSS is a mathematical
model, usefull both to analyze the actual system
334
Prediction Reliability of Container Terminal Simulation Models
situation (to identify system inadequacies or criti- model assigned to each container terminal activity
cal points) and to verify one or more alternative in order to estimate the time required to bring one
projects/interventions. Indeed, a crucial element or more activities to a close (sometimes termed:
in the management process is the simulation of activity time duration). A handling equipment
the effects or impacts of a project scenario. Most model can be assumed deterministic or stochas-
of these impacts can be quantitatively simulated tic. In the former case represent the average time
using mathematical models, which allow us to es- required to bring an activity (e.g. average crane
timate system indicators (cost-benefit indicators; loading time); in the latter case a random variable
multi-criteria indicators, …) without physically should be calibrated in order to model the activity
carrying out the hypothesized projects. time duration uncertainty.
Handling Equipment Model: (sometimes
called cost function or performance function) is a
335
336
Chapter 18
New Profession Development:
The Case for the Business
Process Engineer
Ying Tat Leung
IBM Almaden Research Center, USA
Nathan S. Caswell
Janus Consulting, USA
Manjunath Kamath
Oklahoma State University, USA
aBStract
Adding engineering discipline to defining and managing the operation of business processes has become
a truism although results of practical application have been mixed. This chapter argues that an obstacle
to business process (re)engineering is the lack of a business process engineer role with an associated
professional education, tools, and community. The main argument derives from an analysis of the do-
main structure for system design and comparison with existing practices in manufacturing engineering.
We observe that: (1) At present there does not exist a profession of business process engineers. Their
role in a firm is filled, on an ad-hoc basis, by business line personnel, information technology analysts
or architects, and/or management consultants; (2) There is an increasingly critical need to master the
subject of business process engineering for an individual firm as well as the general U.S. industry; (3)
Other professionals, while having their own specialized skills valuable to a firm, do not necessarily have
the optimal skill set for business process engineering. We therefore conclude that there is an urgent need
for a professional business process engineer. We discuss the skills required of this profession and briefly
describe a first course offered at a university on this subject. We propose that academic institutions
should seriously consider such a new program today.
DOI: 10.4018/978-1-61520-603-2.ch018
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
New Profession Development
337
New Profession Development
that is assigned the responsibility of designing provides a structured way of maximizing both
a business process, but rather adds critical skills customer value and the performance of the indi-
to the team so that the resulting process design vidual business.” [Towill 1997a]
is technically sound. We describe the role of the Business Process Engineer (BPE). We argue
business process engineer in more detail in Section in this paper that there is a need for a professional
3 and propose in Section 4 propose a core skill role in the framework of BSE as defined in Towill
set a BPE ought to possess. Section 5 discusses [1997a, b]. This professional role, whom we call
our experience in an initial step towards business a Business Process Engineer, would be a key
process engineering education. In our concluding contributor in the multi-disciplinary team that
remarks in Section 6, we explain why it is impor- Towill advocated. The job of a BPE is design and
tant to recognize the need for the role of BPE and development of business processes that provide
devote adequate resources for the creation of such efficient and effective composition and coordina-
at the present time. The time to act is now. tion of individual skilled activities to bridge the
A preliminary version of the material con- strategic needs of the business.
tained in this chapter was presented at the IEEE Since the influential work by Hammer and
International Conference on Service Operations Champy [1997], many authors have discussed
and Logistics, and Informatics in 2006 [Leung the importance of business process engineering.
et al. 2006]. More recently, Karmarkar [2004] proposes sev-
eral key competencies for a business enterprise
definitions and related literature to compete in the services based economy, one of
which is business process design. In Chesbrough
There are several definitions and interpretations of [2004], the author puts forth an agenda for ser-
terms related to business processes. We establish vices innovation research and argues, “Any useful
working definitions that we will use in this chapter. understanding of the opportunities and risks that
Similar definitions can be found in the literature; are unique to services innovation will invariably
the Appendix provides a brief comparison. involve business process modeling, business
We use variations of the definitions used in models, systems integration and design.” As we
Davenport and Short [1990] and Towill [1997a], shall see later, these activities constitute a key set
but are more specific to exclude manufacturing of components of business process engineering.
activities for this discussion (in general, business Rouse [2004] proposes that industrial engineers
processes include manufacturing processes): need to expand their focus to the entire business
Business Process. A set of logically related enterprise and even external entities that interact
activities in the day-to-day operation of a busi- with it, including its suppliers, distributors, cus-
ness, including planning activities (e.g., resource tomers, and competitors. The author points out
planning), business transactional activities (e.g., a number of potential education and research
purchasing raw materials and selling products), topics, a crucial one of which is understanding
customer service and support activities (e.g., the relationships between these entities and the
handling warranty issues). entire value stream that flows within and between
Business Process Engineering. We adopt the these entities. These relationships are manifested
definition of Business Systems Engineering (BSE) on a day-to-day basis in intra- and inter-enterprise
suggested in Towill [1997a] as our definition for business processes that need to be designed and
business process engineering: “BSE is a systems controlled in an optimal way. Our chapter con-
approach to designing new business processes tributes along the same line of thought as these
and redesigning existing business processes. It works, but we show in detail why there is a need
338
New Profession Development
for business process engineering and specify what engineering, and industrial or production engi-
role a business process engineer would play in the neering)1. Today, business processes have also
overall design and operation of an enterprise. become quite complicated due to several reasons.
A related work is Tien and Berg [2003], in First, as physical products become increasingly
which the authors propose a set of engineering complex, the complexity of processes that sup-
methods and principles for service systems. port and coordinate all the manufacturing related
These methods span the entire life cycle of a functions has also grown accordingly. Second,
service transaction, from planning to execution to logistics (and hence all its associated processes),
measurement. Our proposed role of the business be it material supply, distribution of products,
process engineer would be a practitioner of some or even logistics of information from suppliers,
of these methods to design and engineer a busi- distributors, and end users have become a round-
ness process. In particular, all of the four major the-clock, global operation. Third, new technol-
characteristics of a service system (information ogy has raised new possibilities and alternatives.
driven, customer centric, e-oriented, and produc- For example, a customer can now place an order
tivity focused) would be key foci of the business through different means: phone, email, fax, elec-
process engineer. Business process engineering tronic data interchange, or the world-wide web.
would be a part of service systems engineering, An order management process has to handle all
but is not limited to service enterprises. It is ap- of these alternatives. Finally, the combination of
plicable and useful for traditional manufacturing the above three factors has increased the com-
industries as well as government institutions. plexity and alternative possibilities of business
In the last several years there has been a fairly processes that they now rival manufacturing
wide recognition in academia of the need of a trans- processes. Coupled with the tremendous growth
formation in business related academic programs of the service industries where business processes
to reflect the needs of the changing environment. are the “manufacturing” processes, it is natural to
Most notable are proposals in Industrial Engineer- seriously consider the subject of business process
ing [Askin et al., 2004; Kamath and Mize, 2003; engineering now.
McGinnis, 2002; Rouse, 2004; Settles, 2003] and
Business (e.g. Smith and Fingar [2002: Appendix a framework for System design
E]). This chapter is a contribution to defining the
requirements for these new programs. For the exposition of the proposed BPE role, we
Obviously, business processes have been in start from an articulation of the general problem of
existence as long as businesses themselves. They system design shown in Figure 1. This framework
are a necessity for a business to operate and deliver forms the basis for analysis of existing roles in
its output, be it a physical product or a service. It business design and comparison with analogous
is only relatively recently (about two decades ago) domains. Referring to Figure 1, three horizontal
that we have used the term “business processes” layers appear in business design, corresponding
and have focused on studying them. The reason to the design of the system as a whole, design
is that up until then business processes were of a configuration of components, and design of
relatively simple and to a large extent manual. the components themselves. Such a three-layered
There was only one or two ways of doing things. framework has its roots from general systems
Manufacturing processes, on the other hand, theory (see, e.g., Bertalanffy (1976)).
were already quite complex and required several The “system definition” layer (i.e., the top
engineering disciplines to set up production (most layer) defines the intent of the system, its posi-
often including electrical engineering, mechanical tioning within a known external environment,
339
New Profession Development
and external behavior of the system in interacting approaches or “algorithms” are an entire research
with its environment. The outcome of a system subject. The outcome of the top layer is usually
definition activity is a description of the external given at the outset of the business process engi-
interactions of the system defining its relationships neering project.
with the environment from the perspective of the In a way, one can also view that the bottom
environment (such as a customer). The external layer is often outside the scope of a business pro-
environment involved is generally very different cess engineering exercise. Unlike the top layer,
in nature from the internals of the business system. the bottom layer is usually not explicitly given,
Engineering this top layer obviously requires but it is practically constrained to a finite set of
strategic considerations of the environment that choices, such as machine types, software pack-
are only possible with distinct training, skills, and ages, or traditional job descriptions or functional
knowledge. positions (for humans). It is entirely possible
The “implementation” or component layer (i.e., that new machines or software packages can be
the bottom layer) focuses on the design of each of custom built from scratch, but such cases are not
a set of parts from which the system is assembled. very common. It would be technically easier to
The design takes place from the perspective of an create new job descriptions, but would still be
execution infrastructure for the business. Each com- nontrivial to gain acceptance and success of the
ponent ultimately will represent a physical entity new position.
(such as a human operator trained in some specific On the right side of Figure 1, we map our
tasks, a machine for producing physical parts, or a system design framework onto the specific case
database engine), since a business will deliver some of designing a business system. To this end, we
physical entity or activity to a customer. chose to use the four layer framework proposed
In a typical business process engineering by Kumaran [2004]. The system definition layer
exercise, the top layer is likely to be outside the corresponds to the market definition and business
scope of the design effort. The top layer is the strategy stages, the system composition to the
job of senior executives or entrepreneurs whose business operations and platform independent
340
New Profession Development
IT design stages, the implementation layer to the the system, the strategy layer, are given. For the
platform independent IT design and platform manufacturing process this includes the material
dependent IT design stages. The business opera- input and product produced. Following Nigam and
tions stage is the logical design of the business Caswell [2003] we take purpose of a process to be
operations required to satisfy the overall or the attainment of some operational goal, such as a
strategic objectives as defined by the top layer sales transaction, and the product to be a business
of business strategy and design. Commonly the artifact. A business artifact is a representation of
case nowadays, the business operations are sup- the information required to know the current state
ported by information technology. The platform of progress toward the goal.
independent IT design stage is where the logical Referring to Figure 1, the first step in the
design of the supporting IT system takes place. system composition band is identification of the
This design is usually different from the business parts that will perform the activities to produce
operations design because very rarely one can the business artifact in question. Figure 2 is a
completely automate the entire business. (At least more detailed version of the right side of Figure
so far we have not seen a completely automated 1, including the typical roles that are responsible
business.) The logical design is independent of for the different design stages. For a manufactur-
the software or hardware platforms that might be ing process, the manufacturing strategy includes
used for its actual implementation. The platform specifications such as make or buy, or the extent
dependent design is the detailed specification to which we make the product, the type of pro-
of the supporting IT system that can be built or duction facility – existing or new, job shop or
purchased (or partially purchased and partially highly automated flow line, etc. Similarly, for
built) without knowledge of any of the layers a business process, the business strategy will
above it. It is a blue-print of the system that can include considerations such as what part of the
be given to, say, a third party system development process is done in house or outsourced and the
vendor to build. location and nature of the facility - existing or
new. Clearly, the exact factors to be considered
depend on the nature of the business artifacts,
deSIgn and develoPment of the existing business environment and long-term
a BuSIneSS ProceSS and a strategy of the firm, the expected volume, profit,
manufacturIng ProceSS and life expectancy of the business artifacts and
their possible follow-on relatives, etc. At the
In this section we present the adaptations of the same time, high level strategic goals are set,
above system design framework for the design such as target lead times, customer order lead
of a business process and a manufacturing pro- times, target work-in-process inventory levels,
cess. As we will see, the framework adapted for and finished goods inventory levels.
manufacturing process design is commonly found For the exposition of this chapter, we purposely
and is relatively well understood. By compar- chose to assume that a cellular manufacturing ap-
ing the business process design version with proach will be used in the example of manufactur-
the manufacturing one, we can identify gaps in ing process design. The design of many business
business process design that is practiced today, in processes has much in common with the design
particular the missing role of the business process of manufacturing cells, as observed independently
engineer. by MacIntosh [1997]. Further, we assume that we
To examine the separate cases of designing a will use product oriented manufacturing cells, i.e.
business process and a manufacturing process, one or few dedicated cells will be designed for
we assume that the external characteristics of the product line in question.
341
New Profession Development
design and development of current task is to plan how the new cells fit into
a manufacturing Process the existing facility and what impact they have
on the existing operation. At this point only the
Based on the manufacturing strategy, overall plan- key input and output of the new cells need to be
ning of the manufacturing operation begins. Figure known – raw materials and end products from the
3 depicts the sequence of activities after setting corresponding cells, or any work-in-process which
the manufacturing strategy. Besides following the have to be sent outside of the cells for processing,
systems design approach discussed above, this such as to a central paint shop or an electroplating
procedure is consistent with the typical manu- line. In order to ascertain the input and output of
facturing systems design practice of going from the new cells, a very high level concept of the
“rough-cut” to detailed design, as advocated by cells has to be developed, such as a preliminary
Browne et al. [1985], Nyman [1992], Suri [1985], grouping of products into families and assigning
among others. The first task in the manufacturing families to cells, the type and a rough number of
operation activity is to determine a manufacturing the cells needed. In particular, product grouping is
process plan for the products to be built, i.e. the not a trivial task; many approaches and algorithms
processing steps required to transform the raw have been proposed in the literature for product
material to the final product. For example, a metal or machine grouping to form manufacturing cells.
part may go through the steps of cutting, turning, Chapter 5 in Nyman [1992] proposed an approach
milling, and final polishing steps. Complex parts for macro facility planning, assuming that the
may involve subassemblies which can either be process plans are given and with an emphasis on
purchased or made in-house. So make-vs.-buy planning for an entire facility from scratch.
decisions for subassemblies or components may Besides the direct production activities, the
be required at this stage. Once the process plan is requirements of the new cells and new products on
developed, it will have to be executed by a physical planning and control functions (such as production
manufacturing facility. Likely the firm already has and inventory planning, shop floor order schedul-
certain existing manufacturing operation (which ing, and materials planning), and other indirect
may be cellular or otherwise, or a mixture), so the support functions (such as equipment maintenance
342
New Profession Development
and shipping) have to be considered. Using the lead basic product in a family) or aggregated products
time and inventory targets set by the manufactur- (such as an “average” product in a family) can be
ing strategy, an approach to master production and used for most of the work here. As well, qualitative
inventory planning for the new products is devised. evaluation such as flexibility, future expansion
Existing planning methods for other products are capability, ease of maintenance, level of human
very useful starting points. The production order skills required, and environmental considerations
release mechanism and intra-cell or department have to be performed. Chapters 6 and 7 in Ny-
level shop floor scheduling are also designed, man [1992] contain a practical approach to the
taking into account the corresponding processes production line design activity.
for other, existing portions of the factory. At the end of the production line design activity,
Once we have laid out what cells we will have, we have a chosen cell design that represents the
what goes in and comes out of those cells, and best cost benefit trade-off with reference to our
how those cells are controlled (in the production strategic goals. This chosen cell design will have
control sense) in the previous “manufacturing to be fully developed into an implementable plan,
operation” activity, we can start to design the with all details such as the full specification of
innards of each cell. This is the production line material handling and production equipment, as
design activity in Figure 3. In this activity, the well as that of planning and control software and
conceptual flow of material within the cell is de- hardware. Sizing of all equipment (i.e., number
veloped, rough sizing of equipment is performed, of machines and their production rates) has to
and a high level layout of the cell is developed. be determined. For decisions such as how many
Alternative designs are considered and evaluated buffer spaces should be allowed for the input and
using suitable analysis tools, such as modeling and output of each machine, or what the algorithm for
simulation. Representative products (such as the loading jobs onto each machine should be, detailed
analysis using simulation modeling is often neces-
sary. Contrary to earlier activities, all parts that
Figure 3. Manufacturing cell design framework
are planned to be produced by the new cells may
(numbers in parentheses refer to chapter numbers
have to be modeled. Besides performance issues,
in Nyman [1992])
other aspects such as the handling of deadlocks
(if it is a fully automated system) or the handling
of reworks have to be considered. Chapter 14 in
Nyman [1992] gives a comprehensive account of
detailed design with an emphasis on the design of
the physical cells. It also touches upon a control
aspect – cell scheduling. Other facets of control,
such as methods for production planning or inven-
tory management of components and raw materi-
als need to be considered as well. Chapter 15 in
Nyman [1992] provides guidelines to equipment
specification and request for proposals. Although
these guidelines were apparently written with a
focus on physical equipment, they also apply to
software that is used for planning and control.
343
New Profession Development
344
New Profession Development
5. Because a business process usually involves cal alternatives are explored, such as combining
human decisions and interventions, the num- certain operations, reducing checks and controls,
ber of possible paths is large and it is more centralized vs. decentralized operations [Hammer
important to provide exception handling and Champy, 1993; Buzacott, 1996]. The level of
capabilities in the process. This is especially detail in the conceptual design should be adequate
true in service industries where the business to provide a meaningful comparison of different
artifact is co-produced with the customer alternatives in terms of cost, response times, or
[Vargo and Lusch 2004] and the customer other measures. Evaluating alternative designs
is actively influencing how the process will is similar to the analogous step in manufacturing
proceed. Since the customer experiences process design. Suitable analysis tools, including
the process first hand, in a way the business quantitative ones such as mathematical modeling
process itself is a business artifact seen by and simulation and qualitative ones such as expert
the customer. Hence we see the rise of the ranking, can be used to estimate the performance
topic “experience engineering.” [Carbone of the different alternatives.
and Haeckel, 1994]. One design is then chosen and full fledged
details will be developed for that design. For
In business process design, given an overall example, a detailed specification of each activity
business strategy (discussed above), the next in the business process, the exact sequences of
step is to design the business operations. This is the activities, the level of resources (human and
composed of several activities, as shown in Fig- machine) required to deliver the expected volume
ure 4. Business process planning is analogous to of work are drawn. The specification of each activ-
developing a manufacturing process plan, where ity includes the input, output, and how the input
each operation step and the sequence of steps is is transformed to obtain the output. The machine
specified logically. This differs from a manu- requirements are most likely IT requirements, and
facturing process plan in that the focus is on the at this point in the design process these are specified
requirements of the process, i.e., what the process in terms of functional (e.g., what data need to be
needs to do, rather than the exact detailed steps provided by the system) and non-functional (e.g.,
(“the how”). For example, the operations may response time or volume of storage) requirements.
include a phone call being received, being routed With the detailed design, the process should be
to the appropriate operator, operator conversing executable with the appropriate human operators,
with the caller, and so on. One of these operations albeit completely manually.
may indeed be “manufacturing the product” but The platform-independent IT design describes
only a high level specification will be considered the processes and information flows that the
(e.g. system input and output). user has chosen to implement in an IT system
Conceptual design will be focused on develop- to support the overall business process. It does
ing to some detail the necessary steps and their not assume a particular implementation (such as
sequence, the logical interaction and impact of hardware and software platforms), allowing itera-
the process at hand on existing processes, and tive performance improvement that are consistent
physical locations of human operators when in- with the requirements set by the previous detailed
tensive interaction between people is expected. design step.
As well, high level ideas are developed on how The platform-specific IT design defines the
business artifacts are grouped such that a group actual IT processes in a specific realization of the
is handled by a corresponding set of operators or platform-independent IT design. Here hardware
a particular version of the process. Different logi- and software specifications are drawn. Today,
345
New Profession Development
many software tools can be used to help assemble under intense financial pressure or when it is under
or generate the actual code that is run during the severe attacks by new or very strong competitors.
operation of the business process. For example, Typical teams include the following roles:
modern enterprise resource planning (ERP) sys-
tems are becoming highly configurable. Once a 1. A business or executive sponsor. This is
specific ERP system is selected, the designer uses usually filled by a senior executive of the
appropriate tools to assemble modules found in enterprise, whose role is to ensure that the
the system to develop a specific realization. process design effort will be a success, in-
Note that in Figure 3 we have depicted the cluding the allocation of adequate resources
activities as sequential with one way arrows. to the effort.
However, this is not true in practice; feedback 2. A process owner who is responsible for
between two activities in sequence exists and the the results produced by the process. This
first activity may be revisited after the second role ensures that the process produces the
activity is partially performed. For example, in the required output at a performance level that
detailed production line design block, we may find is satisfactory to the business.
that the chosen design may not be able to achieve 3. Workers who carry out parts of the process
our objectives (such as production lead time) and on a daily basis. They are the subject matter
we may have to go back to the production line experts (SMEs). They provide requirements
design block to explore other alternative designs to the design and also act as experts in how
that were proposed but not chosen. In fact, the a necessary output can be achieved indepen-
entire manufacturing design block may feed back dent of any specific tool or system used.
to the product design block (not shown in Figure 4. IT architects whose primary purpose is to
3) such that a product design may be modified develop a high level design of the IT system to
to make it more manufacturing friendly. Such is support the business processes and establish
the presently well-known principle of design for a design framework for all sub-systems to
manufacture. follow. They focus on the IT infrastructure
such as computing networks and platforms,
and technical aspects of applications such as
the role of a BuSIneSS availability, scalability, reliability, maintain-
ProceSS engIneer ability, and cost. They take user requirements
(including functional requirements) from the
To date, virtually all business process engineering SMEs and even though they may make sug-
work (including both one-time re-engineering gestions to the process design, their rationale
efforts and continuous process improvement is IT based. IT architects also serve as the
activities) has proceeded under the key assump- SME in the IT area, providing expertise on
tion that facilitated interactions of subject matter what is or is not possible from the technol-
experts (SME) is sufficient to re-engineer com- ogy point of view. The chief architect is
plex systems. Business process design work is typically the single point of contact for all
canonically performed by a multi-disciplinary matters related to IT, and may have overall
team selected from organizations currently operat- responsibility for all such matters.
ing the business. (See e.g., Hammer and Champy 5. IT analysts who primarily act as the bridge
[1993], Towill [1997a, b]). More often than not, between the users (the process workers or
such design or redesign work is commenced when the SMEs) and the IT system developers or
the business is facing a crisis, such as when it is vendor. They take user requirements from
346
New Profession Development
the SMEs, document them and translate them nication patterns, and infrastructure. The speed of
into technical specifications of IT applica- an organic adaptation process is diffusion limited,
tions, and help develop a new application, or with the rate determined by the gradient between
help choose and implement a commercially the old and the new, which is typically rather slow
available one to support the processes. for smallish differences. A new equilibrium may
6. Human resources (HR) or organizational take long to establish, or may even be unstable,
change experts to provide expertise on e.g., oscillating. Instability may occur as a result
matters related to job description, human of changes starting at different places, meeting
performance incentives, organizational de- and modulating each other in some way, and then
sign that accompanies the process design, re-propagating again. It is interesting to note that
or work culture. at times there can be many changes happening to
7. The customer of the process is sometimes no eventual productive purpose.
part of the team to ensure a smooth process What is lacking in this common scenario is a
handoff during production. role that takes an active process design function
focused on the consistency, completeness, and
Such experts drawn from the existing business optimization of the system as a whole rather than
generally have a stake in the status quo. The as- on its parts. We believe that this role should be
sumption is that such a team has all the knowledge filled by a professionally trained business process
and skill required to design an integrated system: engineer. The business process engineer possesses
the only thing they lack is the ability to work skills of process engineering at the general or ab-
together, so facilitation and structuring the reen- stract level and applies them to the process design
gineering activity is required. This often leads to at hand. He/she provides expert guidance to the
the hiring of management consultants who bring team, leads the team through a structured process
a structured methodology or approach that they of process design and engineering, performs the
have used in the past. necessary technical analysis, helps interpret the
The above approach results in “design by results of the analysis, and brings in knowledge
committee” solution2. Characteristics of such of what information and other technologies can
solutions, such as local optimization and a lack provide to support or enable the process. (Today,
of overall cohesion or accountability, often occur some management consultants provide some
in descriptions of reengineering efforts. Account- of these capabilities, most notably a structured
ability for the design, as opposed to the project process or “methodology” to perform business
accountability (i.e., for meeting project comple- process engineering.) With this role, the new
tion dates and budgets), may appear to rest with design will not be blindly or overly dependent
the process owner role, but this may not be the on what is being done today or what the SME’s
case in practice. The process owner is generally have seen in their own experience. (However, the
an executive role, responsible for the execution existing design is always available as a starting
of the process and accountable for the results point of a new design.)
produced by the process, but not for the design of Figure 5 conceptually compares the present
the process itself. Changes to the process design state of design by committee and the future state
are therefore often left to natural adaptation with of having a business process engineer as the
details determined by the local workers. professional designer in the team. The existing
Further, many types of changes to an existing team members are still very much needed in the
process are inelastic due to the time that it takes to future, but we also need the input and effort of a
change such things as culture, incentives, commu- professional process designer.
347
New Profession Development
As Figure 2 depicts, the business process en- Because of the fundamental differences be-
gineer in many aspects plays the analogous role tween a manufacturing process and a business
of the manufacturing process planner or engineer, process noted earlier, the business process engineer
as follows. has a slightly different responsibility in the busi-
ness operations task (see Figure 1) from that of
1. Just as manufacturing process planners or the manufacturing process engineer in the manu-
engineers design and optimize a production facturing operations task. The following represent
process plan for a physical product, business the respective implications of the differences in
process engineers design and optimize a busi- the processes as discussed in Section 2.
ness process to produce the required output,
be it an information based business artifact 1. There is no separate physical production
or a customer experience encountered in a line design task in business process design.
service. Capacity planning of human operators is
2. Similar to the make-vs.-buy decision in performed in the business operations task.
manufacturing, the business process engi- The business process engineer effectively
neer determines what, if any, portion of the represents a combination of the manufactur-
process or business artifact is outsourced ing process engineer and the manufacturing
or purchased from a supplier. This deci- systems engineer.
sion is based on an analysis of strategic 2. The supporting IT system is usually not a
considerations, cost, response time, ease of bottleneck in interactive usage mode and is
managing the process interfaces, as well as hence ignored in the capacity planning of
the availability of outsourcing providers. human operators. In cases where IT system
3. Just as manufacturing process engineers is used intensively and where the computa-
work with manufacturing systems engineers tion time is significant, the IT system is
and machine engineers, business process usually used in batch mode without human
engineers work with IT architects, analysts, intervention.
and software engineers for detailed design 3. IT hardware and base operating systems are
and development. limited to a few standard choices. Software,
either purchased as-is, custom built, or most
348
New Profession Development
likely custom configured, is a major focus identifying the key skills for a successful BPE.
of business process design. Further, the We note that many of these technical areas are
software applications supporting a business not new in themselves. Some specific techniques
process are often of an interactive, real time and methods have already been proposed in the
nature. (In manufacturing systems, there are literature [Biemans et al. 2001; Buzacott, 1996;
also real time software applications, such Chadha, 1995; Osmundson et al., 2004; Park and
as those in machine control. Such are usu- Park, 1999; Rouse, 2005; Sousa et al., 2002; Tait,
ally outside the scope of the manufacturing 1999; Towill, 1997a, b]. Others have grown out
process engineer.) of other disciplines but have wide applicability
in business process engineering. Just like when
As discussed earlier, today’s emphasis is on computer science started more than half a century
transaction management software in business ago, many topics then were part of other fields
process design. On the other hand, the nature of a such as mathematics and electrical engineering.
business process (as we defined it) usually entails
substantial human involvement. The business critical Skills of a BPe
process engineer therefore would have a stron-
ger focus on human-human or human-computer We assume that basic scientific thinking, engi-
interaction, group dynamics, negotiation, and neering fundamentals, and mathematics, such as
real-time decision making. (In manufacturing those provided by an undergraduate engineering
systems, there is obviously an important human degree program, are already covered. We use an
element to them and past human factors studies outcome-based approach to describe the skill set
have focused on a most directly relevant aspect of a BPE. We group the skills according to the
- humans performing physical tasks.) focus areas within a BPE’s job scope, as shown
It is interesting to note that few industries in Figure 6. For each focus area of a BPE shown
have existing or emerging roles that are close to in Figure 6, we list, in Table 2, Table 3, and Table
a BPE. In hospitals, the role of industrial engi- 4, the key educational outcomes relevant to that
neers is filled by management engineers, a well area and the corresponding topics that need to
accepted professional job in the field [HIMSS be taught in order to achieve the educational
2009]. Hospitals have notoriously complex and outcomes. In addition, Table 1 contains the edu-
potentially inefficient processes, even though cational outcomes and the respective topics for a
they do not make a traditional, physical product. basic set of skills of a BPE.
We would like to generalize this role to all other
industries.
an InItIal SteP In
BuSIneSS ProceSS
the SKIll Set of a BuSIneSS engIneerIng educatIon
ProceSS engIneer
college level education in
In this section we discuss the skill set required to Business Process engineering
perform the role of a business process engineer
explained in the previous section. While an ex- The two logical home departments for business
tensive discussion of skills needed by the BPE process engineering education at the undergradu-
and their justification are outside the scope of ate and graduate level are Industrial Engineering
this chapter, we present our preliminary work on (IE) and the Business School. The former may
349
New Profession Development
present the greatest opportunity to develop and software developers and vendors. These programs
offer such a program because of the current status emphasize business and IS/IT concepts and are
of IE education and practice, its unique mix of somewhat weak in system design content. Nev-
human-technology-business tradition, and the ertheless, much knowledge offered by business
applicability of many of its existing courses. The schools today, such as business strategy, financial
IE community is beginning to realize that mod- planning, business performance measurement,
ernizing the curriculum is critical to the future is fundamental to a BPE (as evidenced by our
of the IE discipline. Several efforts have been discussion throughout Sections 3 and 4 in this
underway to define the IE of the future [Askin chapter). This is similar to the existing relation-
et al., 2004; Kamath and Mize, 2003; Kuo and ship between business schools and industrial
Deuermeyer, 1998; McGinnis, 2002; Rouse, 2004; engineering departments today.
Settles, 2003]. Today’s IEs do much more than
task-oriented efficiency studies. The scope of IE Pilot offering of a BPe course
has gone beyond the design of the physical work
place and production processes to the design of A senior-level elective course titled “Engineering
systems involving knowledge/information work Business Processes” was designed and approved
[Kamath and Mize, 2003]. BPE is a natural exten- as part of the Bachelor of Science curriculum
sion of the traditional, physical production space in Industrial Engineering and Management
into the non-production space. We submit that (BSIE&M) at Oklahoma State University,
BPE should be part of the core program of the Stillwater, OK, US. The course format included
“new” industrial engineer. traditional lectures by the instructor and several
Programs offered by Business Schools have presentations by the students. Due to the limited
been undergoing rapid changes driven by relatively hours in a single undergraduate course, only a
recent technology advancements. They have taken key subset of the all the skills discussed in Sec-
the lead role in offering programs and options tion 4 was included in the course. The topics
that focus on information systems, e-commerce, were grouped into three modules (i) Overview
and supply chains. However, these programs of business concepts and introduction to BPE,
produce mainly business analysts or information (ii) Modern enterprise concepts, and (iii) Mod-
system analysts, a primary role of whom is to act eling, analysis, design and implementation of
as a liaison between the business users and the business processes.
350
New Profession Development
Table 1. BPE skill set – basics Table 2. BPE skill set – process design
351
New Profession Development
Table 3. BPE skill set – process monitoring and Table 4. BPE skill set – process automation and
measurement support
352
New Profession Development
that have made IT a much friendlier tool when lean and efficient governments, business process
compared to that of the past. Such IT tools have engineering is a crucial subject for the U.S. and
and will enable the automation and transformation other governments in developed countries.
of many business processes and in some cases Further, because IT is almost the sole, and cer-
entire industries. Well-known examples: Rental tainly the predominant, technology available for
car check-out and check-in, on-line auctions or a business process, the success of the IT industry
reverse auctions in the B2B and B2C space, or will have an intimate relationship with the success
even the process of collecting information for of business process engineering. For one, many
and filing individual income tax. Many of these requirements of IT will come from the needs of
important transformations have been invented by engineering a business process. The days of IT as
individual entrepreneurs who relied on their keen a pure automation tool are numbered in developed
observations on certain inefficiencies of a familiar countries. Significant new developments in IT will
business process. In order to exploit, on a broad go hand in hand with new, innovative ways of
scale in all industries, the use of technology in transforming an existing business process. Major
transforming (i.e., beyond automating) business IT vendors (such as IBM) have already recognized
processes into more effective ones, we need more this trend, as can be seen by their emphasis on
resources than the gifted entrepreneurs who, by the business transformation business in the last
definition, are only interested in opportunities that several years. The continued success of the IT
are extremely profitable to them. industry, especially in developed economies, will
As is widely known in the U.S., the contin- to a significant extent depend on our success in
ued shift of the economy from manufacturing business process engineering.
to services has underscored the importance
of non-production processes (see Figure 7). It
has been estimated that two-thirds of the U.S. referenceS
non-farm labor force belongs to the category of
service providing (rather than goods-producing) Askin, R., Goldberg, J., Goetschalckx, M., Kuo,
workers. While our know-how in manufacturing W., Rardin, R., & Wysk, R. (2004). IE curriculum
process design and management had propelled renovation. Panel discussion, Industrial Engineer-
U.S. manufacturing to the top in the past, we ing Research Conference, Houston, TX.
need to do the same for service industries for the Bertalanffy, L. V. (1976). General system theory:
U.S. economy to survive and continue to grow Foundations, development, applications. Revised
in this changing, global environment. Business edition, New York: George Braziller Inc.
process engineering to service industries is the
equivalent of manufacturing engineering to Biemans, F. P. M., Lankhorst, M. M., Teeuw, W.
manufacturing industries. B., & van de Wetering, R. G. (2001). Dealing with
It is also essential to note that the government in the complexity of business systems architecting.
the U.S., while employing about the same fraction Systems Engineering, 4(2), 118–133. doi:10.1002/
of non-farm people as the total of manufacturing sys.1010
and other goods producing sectors since 2003, is
Blackburn, J. D. (1990). Time-based competition:
largely engaged in non-production activities (see
the next battleground in American manufacturing.
Figure 7). It can be argued that business process
New York: McGraw-Hill.
engineering is therefore as crucial as manufactur-
ing engineering, based on the needs of the gov-
ernment sector alone. In this age of emphasis on
353
New Profession Development
Browne, J., Chan, W. W., & Rathmill, K. (1985). Kamath, M., & Mize, J. H. (2003). Impact of
An integrated FMS design procedure. In An- major driving forces on IE education and practice.
nals of Operations Research, 3, K.E. Stecke & In Proceedings of 2003 Industrial Engineering
R. Suri (Eds.), Basel-Switzerland: J.C. Baltzer, Research Conference, Portland, OR.
207-238.
Karmarkar, U. (2004). Will you survive the
Buzacott, J. A. (1996). Commonalities in re- services revolution. Harvard Business Review,
engineered business processes: Models and 82(6), 100–107.
issues. Management Science, 42(5), 768–782.
Kumaran, S. (2004). Model driven enterprise. In
doi:10.1287/mnsc.42.5.768
Proceedings of the Global EAI Summit, Banff,
Carbone, L. P., & Haeckel, S. H. (1994). Engineer- Canada, 166-180.
ing customer experiences. Marketing Manage-
Kuo, W., & Deuermeyer, B. (1998). IE2-the IE
ment, 3(3), 8–19.
curriculum revisited: Developing a new under-
Chadha, B. (1995). A model driven methodology graduate program at Texas A&M University. IIE
for business process engineering. In Proceedings Solutions, 30(6), 16–22.
of the ASME Computers in Engineering Confer-
Leung, Y. T., Caswell, N., & Kamath, M. (2006).
ence.
The case for the business process engineer. In
Chesbrough, H. W. (2004). A failing grade for Proceedings of the IEEE International Confer-
the innovation academy. Financial Times (North ence on Service Operations and Logistics, and
American Edition), (September): 25. Informatics, Shanghai, China, 1119-1124.
Chesbrough, H. W. (2005). Towards a new sci- MacIntosh, R. (1997). Business process re-
ence of services. In Breakthrough ideas for 2005. engineering: New applications for techniques of
Harvard Business Review, 83(1), 16–17. production engineering. International Journal of
Production Economics, 50(1), 43–49. doi:10.1016/
Curtis, B., Kellner, M. I., & Over, J. (1992). Process
S0925-5273(97)89132-3
modeling. Communications of the ACM, 35(9),
75–90. doi:10.1145/130994.130998 McGinnis, L. (2002). A brave new education. IIE
Solutions, 34(12), 27–31.
Davenport, T. H. (1998). Putting the enterprise into
the enterprise system. Harvard Business Review, Nigam, A., & Caswell, N. (2003). Business arti-
76(4), 121–131. facts: An approach to operational specification.
IBM Systems Journal, 42(3), 428–445.
Davenport, T. H., & Short, J. E. (1990). The new
industrial engineering: Information technology Nyman, L. R. (1992). Making manufacturing cells
and business process design. Sloan Management work. Drabber, MI: Society of Manufacturing
Review, 31(4), 11–27. Engineers.
Hammer, M., & Champy, J. (1993). Reengineering Osmundson, J. S., Gottfried, R., Chee, Y. K., Lau,
the corporation. New York: Harper Business. H. B., Lim, W. L., Poh, S. W. P., & Tan, C. T. (2004).
Process modeling: A systems engineering tool for
Healthcare Information and Management Systems
analyzing complex systems. Systems Engineering,
Society (HIMSS). (2009). What is a management
7(4), 320–337. doi:10.1002/sys.20012
engineer or process improvement professional?
Retrieved April 2009, from www.himss.org.
354
New Profession Development
Park, J. Y., & Park, S. J. (1999). IBPM: Towill, D. R. (1997a). Successful business systems
An integrated systems model for business engineering. Part 1: The systems approach to busi-
process reengineering. Systems Engineer- ness processes. Engineering Management Jour-
ing, 1(3), 159–175. doi:10.1002/(SICI)1520- nal, 7(1), 55–64. doi:10.1049/em:19970109
6858(1998)1:3<159::AID-SYS2>3.0.CO;2-H
Towill, D. R. (1997b). Successful business sys-
Perez, C. (2002). Technological revolutions and tems engineering. Part 2: The time compression
financial capital: The dynamics of bubbles and paradigm and how simulation supports good BSE.
golden ages. Northampton, MA: Edward Elgar. Engineering Management Journal, 7(2), 89–96.
doi:10.1049/em:19970209
Rouse, W. B. (2004). Embracing the enterprise.
Industrial Engineer, 36(3), 31–35. Vargo, S. L., & Lusch, R. F. (2004). Evolving
to a new dominant logic of marketing. Jour-
Rouse, W. B. (2005). Enterprises as systems:
nal of Marketing, 68(1), 1–17. doi:10.1509/
Essential challenges and approaches to trans-
jmkg.68.1.1.24036
formation. Systems Engineering, 8(2), 138–150.
doi:10.1002/sys.20029
Settles, S. F. (2003). Information systems en-
endnoteS
gineering emphasis. In Proceedings of 2003
Industrial Engineering Research Conference, 1
There are many obvious examples of fairly
Portland, OR. complicated products that have been in
Smith, H., & Fingar, P. (2002). Business pro- large-scale production since World War II.
cess management: The third wave. Tampa, FL: They include consumer products such as
Meghan-Kiffer Press. automobiles and televisions, not to mention
commercial aircraft and shipbuilding.
Sousa, G. W. L., Van Aken, E. M., & Groesbeck, 2
Perhaps the comparison point to make here
R. L. (2002). Applying an enterprise engineering is that the factory level design isn’t going to
approach to engineering work: A focus on busi- be performed by a production line workers’
ness process modeling. Engineering Management committee. They are a clear source of input
Journal, 14(3), 15–24. as to what works, what is problematic but
Suri, R. (1985). Quantitative techniques for ro- do not have the overall, integrating view-
botic systems analysis. In Handbook of Industrial point.
Robotics, S.Y. Nof (Ed.), Chapter 31. New York:
3
Other goods producing sector includes min-
Wiley. ing & logging, construction. Non-govern-
ment service providing sector includes trade,
Tait, F. (1999). Enterprise process engineering: A transportation, & utilities; information;
template tailored for higher education. CAUSE/ financial services; professional & business
EFFECT Journal, 22(1), 40-43, 57. services; education & health services; leisure
Tien, J. M., & Berg, D. (2003). A case for ser- & hospitality; other services. Data source:
vice systems engineering. Journal of Systems U.S. Bureau of Labor Statistics, Annual
Science and Systems Engineering, 12(1), 13–38. Average Employment, retrieved from ftp://
doi:10.1007/s11518-006-0118-6 ftp.bls.gov/pub/suppl/empsit.ceseeb1.txt,
April 2009.
355
New Profession Development
aPPendIX
In the research literature, there are several definitions and interpretations of terms related to business
processes. We provide a brief comparison of those definitions with that used in this chapter.
Process
Any activity or group of activities that takes an input, adds value to it and provides an output to an
internal or external customer. Processes use an organization’s resources to provide definitive results on
behalf of the business [Towill, 1997a].
Our definition of a process agrees in principle with the above. However, we wish to emphasize the
ordering present within a group of activities by qualifying “activities” above with “activities arranged
or linked in a specified order.” The activities of a process are not just a set, but a set with very specific
relations between the elements. We also note the often neglected role of resources in defining both the
structure of a process and interactions between processes. The value of processes is not just in aggregat-
ing the functional activities but in coordinating actions and resources.
Business process
A linked or natural group of skills and competencies which start from a set of customer requirements
and deliver a total product or service [Towill, 1997a].
A set of logically related tasks performed to achieve a defined business outcome [Davenport and Short,
1990].
In general, we use a variation of the above definitions and add examples of the groups of activities,
which allows us to use a narrower definition for this article:
A set of logically related activities in the day-to-day operation of a business, including planning
activities (e.g., resource planning), manufacturing activities (e.g., building a gadget), business transac-
tional activities (e.g., purchasing raw materials and selling products), and customer support activities
(e.g., handling warranty issues).
However, in this chapter, we use the term business process to mean non-manufacturing activities,
to distinguish from manufacturing activities for convenience of comparison. We also use “activities”
instead of “tasks”. As is customary, an activity is defined as a collection of closely related tasks and is
therefore a level above a task in the process hierarchy.
356
New Profession Development
The means by which an organization can achieve radical change in performance as measured by cost,
delivery time, service and quality via the application of the systems approach which focuses on a busi-
ness as a set of customer-related core business processes rather than as a set of organizational functions
[Towill, 1997a].
The analysis and design of work flows and processes within and between organizations [Davenport
and Short, 1990].
… the fundamental rethinking and radical redesign of business processes to achieve dramatic improve-
ments in critical, contemporary measures of performance, such as cost, quality, service and speed
(Hammer’s definition from [MacIntosh, 1997]).
… the redesign of an organization’s business processes to make them more efficient [Curtis et al.,
1992].
BPR is seen by some as a tool or technique that has transformed organizations to the “degree that Tay-
lorism once did [Davenport and Short, 1990].” BPR has been differentiated from the constant tweaking
of process details (a.k.a. continuous process improvement or CPI) by the “radical” or step changes that
it causes in an enterprise’s processes. In addition, cross-functional processes and the advancements in
IT are often associated with BPR activities.
Our focus in this chapter is on business process design/engineering and we believe that our definition
and approach can easily be adapted to redesign/reengineering situations by making the obvious changes.
Like Towill [1997a, b] we also advocate a systems approach, wherein the focus is on the behavior and
performance of the total enterprise.
BSE is a systems approach to designing new business processes and redesigning existing business
processes. It provides a structured way of maximizing both customer value and the performance of the
individual business [Towill,1997a].
Towill’s [1997a, b] work certainly help lay a foundation for our thesis here. We argue in this paper that
there is a need for a professional role in the framework of BSE as defined by Towill [1997a, b]. This
professional role, whom we call a Business Process Engineer, would be a key contributor in the multi-
disciplinary team that Towill advocated. As we will see in the later sections of this paper, the BPE draws
357
New Profession Development
on the principles of systems thinking with skills from a set of different yet related disciplines of business,
industrial engineering, operations research, computer science, and information systems and technology.
It is a professional discipline whose purpose is the design and development of business processes.
358
359
Chapter 19
Logistics Services in
the 21st Century:
Supply Chain Integration and
Service Architecture
Marcus Thiell
Universidad de los Andes, Colombia
Sergio Hernandez
Universidad de los Andes, Colombia
aBStract
Due the cross-functional character of logistics tasks and the cross-organizational structure of most lo-
gistics chains, the logistics service industry is strongly affected by business dynamics. Since the 1950s,
this industry has experienced a variety of changes; While logistics was traditionally concerned with the
fulfilment of functions like transportation and warehousing, modern logistics service offerings also en-
compass services like network design and carbon footprint assessment. But not just the scope of logistics
services has changed. Additionally logistics business models developed from 1PL to 4PL, indicating a
shift from the provision of execution tasks to tactical tasks and from fragmented logistics solutions to
integrative logistics solutions for complete logistics chains. As a consequence, logistics service providers
at the beginning of the 21st century have many options to configure their service offerings. But which
options exist to comply with the requirements in a modern competition being fought supply chain versus
supply chain rather than firm versus firm? After analyzing the dynamics in the logistics service industry
and the importance of logistics for an effective and efficient supply chain management, this chapter
will focus on options how logistics service providers can construct single logistics services (service
architecture), their logistics service program (service program architecture) and their appearance on
the market (service provider architecture) in order to fulfil their role within today’s supply chains and
to improve supply chain performance.
DOI: 10.4018/978-1-61520-603-2.ch019
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global is prohibited.
Logistics Services in the 21st Century
360
Logistics Services in the 21st Century
well as to organizations. In this chapter we will While transportation, order processing, storage and
primarily focus on business-to-business transac- handling are denoted as basic or traditional logistics
tions. services, modern logistics service offerings also
As demonstrated in Table 1, the scope of logistics contain order finishing and consulting services,
services is very wide as the term ‘logistics’is not sup- as these services are sometimes necessary to solve
ported by a single verb but covers several functions customer specific logistics problems in today’s
in the context of bridging spatiotemporal disparities competitive environment (Klaas 2002).
in value networks (Wegner 1993, Gebhardt 2006). Due to their heterogeneity it is difficult to
position logistics services as a whole into exist-
ing service classifications (see Figure 1), as the
Figure 1. Services classification (Maister &
following two examples demonstrate: Goods
Lovelock 1982)
transportation services on the one hand would
probably be classified as ‘service factory’ as their
degree of customization as well as their degree
of interaction can be described as ‘low’. Logis-
tics consulting services on the other hand could
in general be denoted as ‘professional service’
due to their high degree of interaction and also
customization.
Despite of the difficulties to position logistics
services into existing schemes, they have certain
characteristics in common, which are deduced
from the above mentioned service definition (see
Table 2).
These characteristics are important issues for
the logistics services transaction because they lead
361
Logistics Services in the 21st Century
to asymmetric information and cause a special Resources are the tangible and intangible
structure of the transaction processes. production factors involved in the transaction
Based on findings of the International/Industrial process controlled by different members of an or-
Purchasing and Marketing Group (IMP-Group), the ganization. Different characteristics of resources
transaction processes of logistics services can be between transaction partners finally constitute a
described as a combination of actors, resources and business relationship (e.g. the capabilities of the
activities (Axelsson & Wynstra 2002). Originally service provider to solve the buyer’s problem)
developed as an approach to describe and to analyze (Calaminus 1994).
dyadic structures, this approach was decentrally Activities are executed by actors as a se-
further developed towards several network models quence of target-oriented operations (Håkansson
(Håkansson 1982; Håkansson & Johanson 1992; & Snehota 1995). In the context of logistics
Håkansson & Snehota 1995). service transactions these activities can be di-
Essential relations between the above mentioned vided into activities performed by the service
basic elements can be described as following (Ca- provider, activities of the buying company and
laminus 1994): Actors use and control resources; interaction-activities performed by the supplier
actors perform activities; actors connect resources and the buyer (see Figure 2).
via activities. The relevance of this basic model – Logistics service transactions are conse-
also denoted as ARA-model – in the context of the quently interaction processes which connect
topic treated in this chapter becomes clear as the purchasing process, sales process and service
description and analysis of interactions are explic- provision process at several moments during
itly considered. Thus, the model corresponds to a the transaction.
substantial characteristic of logistics services trans- It is necessary to mention that the detailed-
actions, the interaction between service provider ness of each individual phase as well as the time
and client in the service transaction process. interval from need identification to the ‘delivery’
Actors can be differentiated into inter-organi- of the transaction result can vary a lot depending
zational actors (e.g. buying center, selling center, on the transaction constellation, which itself is de-
intermediaries) and intra-organizational actors termined by type and importance of the logistics
(e.g. user department, sales department), which service as well as by the buy-class – the degree
in general pursue different goals in the transaction of repetition of the transaction process from the
process. buyers point of view (Robinson et al. 1967).
362
Logistics Services in the 21st Century
As demonstrated above, the transaction pro- architecture of logistics service offerings, and,
cess of logistics services in its generic structure consequently also on the business models of lo-
is already complex. An important driver of its gistics services providers (see Figure 3). While
actual complexity is the amount of single services all business models (1PL, 2PL, 3PL, and 4PL)
necessary to solve the customer’s problem, as the still exist in today’s logistics service industry,
number of elements of the transaction in terms of they developed sequentially in the course of time
actors, resources and activities increases with an and suit as a basis to describe the evolution of
extended scope of services required. logistics services offerings in terms of changes
of the service architecture:
evolution of logistics
Service offerings • First Party Logistics (1PL): Until the 1970s
logistics services were primarily performed
In 1955, while logistics were already established in-house by manufacturing companies.
in military systems for centuries, Morgenstern in These companies belong to the group of
his article ‘Note on the Formulation of the Theory 1PL-providers, which own logistics assets
of Logistics’ introduced the term ‘logistics’ in (e.g. trucks and warehouses) and have the
the context of business problems (Morgenstern capabilities to execute the logistics tasks of
1955). This publication serves as a fixed point warehousing and transport services on be-
for the description of the evolution of logistics half of procurement, production and sales
services. Ballou for example separates the early requirements. Mainly international logis-
stages of business logistics into the phases ‘the tics operations were outsourced to freight
dormant years` (before 1950) and ‘the develop- forwarding specialists (Engel et al. 2003).
mental years’ (1950-1970), followed by a third • Second Party Logistics (2PL): Influenced
stage, ‘the takeoff years’, which began in the by an increasing internationalization of
1970s (Ballou 1985). operations and the emergence of new
We will describe the evolution of logistics management concepts like ‘lean manage-
services starting from the second stage, when ment’ and management principles like the
market dynamics led to a continuous integra- ‘concentration on core competences’ in the
tion of logistics services with an impact on the 1980s, companies began to intensify the
363
Logistics Services in the 21st Century
outsourcing of logistics services. Logistics described above, it becomes clear that logistics
service providers which assume the basic tasks performed by service providers on the one
logistics tasks of their clients and operate hand developed from execution tasks to tactical
on the execution level are denoted as 2PL- tasks. Starting before the 1950s on a ‘fragmentary
providers (e.g. freight forwarders, shipping basis’ (Bowersox et al. 1986), the evolution of
companies, consolidators). logistics business models on the other hand also
• Third Party Logistics (3PL): In the 1990s demonstrates the tendency towards the offering
a logistics concept called 3PL or ‘contract of integrative logistics solutions for complete
logistics’ developed from 2PL. By extend- logistics chains.
ing the management functions to planning
and coordination of logistics tasks and also logistics trends at the
offering value-added services (see 3.1), Beginning of the 21st century
3PL-providers are able to provide com-
plete logistics service packages (in gen- Due to the cross-functional character of tasks and
eral) on the basis of longer-term relation- the cross-organizational structure of most logistics
ships (Marasco 2008). chains, logistics are strongly affected by business
• Fourth Party Logistics (4PL): Already in dynamics. Reducing the wide range of current
the middle of the 1990s the next type of business trends to perhaps the most relevant ones,
logistics service business models formed, this section will refer to the impact of ‘globaliza-
denoted as 4PL (also described as ‘lead tion’, ‘environmental responsibility’, ‘visibility’,
logistics’ [LL]). While 3PL-providers can and the trend towards ‘supply chain integration’
also reach the tactical level of the custom- on logistics systems:
er’s management system within long-term
strategic partnerships, 4PL includes two • Globalization: Already long-lasting, the
core tasks of tactical nature: supply chain globalization trend influences logistics op-
integration and supply chain management. erations still to a large extent. Globalization
This integration and management of sev- efforts of clients result in increasing de-
eral actors in the supply chain includes mand for global coverage of logistics ser-
logistics services and passes the company vice offerings. But the expansion of pro-
borders of the customer as it also ideally curement, production and/or distribution
integrates upstream (e.g. suppliers) and networks also creates a higher complexity
downstream (e.g. distributors) actors of the of logistics systems because new actors,
chain. The objective to integrate complete resources and activities operating in het-
supply chains stresses the importance of erogeneous market environments need to
the information flows within them. In the be integrated in existing structures of lo-
concept of 4PL an increasing substitution gistics chains.
of material flows by information flows • Environmental Responsibility: Growing
supported by the use of modern informa- environmental consumer awareness in
tion technologies can be observed (Schmitt many countries, increasing prices for raw
2006). materials and energy, environmental leg-
islation and also pressure from dominant
Although there is no general consensus in actors in the supply chain force companies
literature regarding the definition and scope of around the world these days to implement
tasks covered by each logistics business model reverse logistics systems and closed-loop
364
Logistics Services in the 21st Century
supply chains (Voigt & Thiell 2004). The for example, respond to this need with the
tendency to implement ‘environmental offering of services like tracking & trac-
responsibility’ into the target systems of ing, automated shelf replenishment using
clients affects the logistics service indus- RFID, and locate-to-order strategies in the
try concerning three relevant aspects: (1) distribution channel. Nevertheless, critical-
Environmental friendliness becomes a ly concerning the realization of end-to-end
criterion in the selection process of logis- supply chain visibility are still the neces-
tics service providers, often resulting in sary investments and the operating costs of
necessary investments of the providers to the technologies, which in particular cause
improve e.g. their ‘carbon footprint’. (2) problems for small and medium sized logis-
Furthermore, this trend offers (new) busi- tics service providers.
ness opportunities for logistics service pro- • Supply Chain Integration: Companies
viders in terms of options to expand their nowadays strive for the management of
service program. (3) Closed-loop supply complete supply chains, from raw material
chains also add actors, resources and ac- suppliers to end customers, in which the
tivities to existing logistics systems and ‘relevant business system’ fighting for com-
consequently increase their complexity. petitive advantages on the markets is no lon-
Nonetheless, it is widely recognized that ger determined by the legal independency
‘closing the chain’ creates higher customer of companies, but by the economic depen-
satisfaction and consequently value to the dency between the actors of a chain (Loren
companies who implement reverse logis- 2005, Ketchen & Hult 2007). Supply chain
tics systems (Kumar & Malegeant 2006). integration asks for integrated logistics
• Visibility: Driven by performance improve- chains managed in the ideal case by one fo-
ments of information technologies (e.g. cal organization as multiple suppliers would
Internet-Technologies, Radio Frequency fragment the chain. For example, 4PL is a
Identification [RFID]) and the reduction concept supposed to fulfill these market re-
of their cost, the trend towards end-to- quirements but it also provides a challenge
end supply chain visibility affects today’s for the logistics industry in terms of need for
(global) logistics chains to a large extent. a culture of collaboration.
Striving for an effective coordination of all
chain activities requires visibility which in These mentioned trends finally demonstrate
turn depends on the optimized use of infor- that business dynamics determine the current
mation technologies. In a chain with high status of logistics systems and provide permanent
visibility, emerging opportunities and risks challenges for their management.
can rapidly be identified, reported and an-
ticipated – a substitution of material flows
by information flows becomes possible. logIStIcS ServIceS and
But if visibility is missing or information SuPPly chaIn management
flows are interrupted, excess inventory, late
delivery, high expediting cost, production roles of logistics Services
downtime, etc. are often the consequence. Providers along the Supply chain
In this sense, visibility along the chain
becomes an important issue for logistics Within the structure of a supply chain – a con-
clients. Logistics services providers can, nected series of resources and actors involved in
365
Logistics Services in the 21st Century
the creation, transformation and delivery of value • Logistics service providers manage the
to end customers – logistics services are the ‘vital intra-organizational flows of products and
link’, because a chain’s internal and external ele- related information between the function-
ments need to be managed in a way that ‘value’ al areas of procurement, production, and
flows frictionless through the complete chain to manufacturing as well as the cross-organi-
the end customers (see Figure 4). zational flows between legally independent
As a practical example, Figure 5 presents a actors of a supply chain.
typical supply chain of the semiconductor indus- • Logistics service providers are ‘informa-
try, indicating activities performed by logistics tion providers’ for supply chain manage-
service providers at each interface between the ment. Because of their position at every
actors in the chain. interface of a supply chain, the sum of
Due to the above described relation, logistics information available in the complete lo-
management is part of supply chain manage- gistics system is of high value for supply
ment responsible for all tasks concerning the chain management. Managing the infor-
management of flows of products and the related mation of the logistics system in an effec-
information within this connected series. The tive and efficient way can serve as a ‘ra-
roles assigned to logistics service providers refer dar system’ to identify supply chain risks
to four aspects: and opportunities, it can help to reduce the
‘bullwhip effect’ (Lee et al. 1997), and in
Figure 5. Position of logistics service providers in the semiconductor industry (based on U.S. Interna-
tional Trade Commission 2005)
366
Logistics Services in the 21st Century
general it can improve the quality of stra- percentage of logistics costs on the prod-
tegic, tactic and operational planning. But uct price or the sales volume. According to
such achievements can only be realized if The Latin America Logistic Center, logis-
the logistics system is managed centralized tics cost as a percent of the product price
or if information within the chain is shared in the United States account for 9%, while
in a collaborative way. in Latin America this percentage rises up
• Logistics service providers may also play to 20% (Latin America Logistics Center
the role as ‘neutral agents’ within a supply 2005). A reduction of this amount should
chain. For example, in a case where at least be a main concern of management as it has
two supply chain actors decide to transfer an important impact on the competitive-
the responsibility for the optimization of the ness of companies and chains, especially
logistics performance level between them in global competition. Given the increas-
to a logistics service provider, this provider ing environmental awareness in many
may be able to balance the interests of the countries around the world, the integra-
co-contractors by subordinating individual tion of the external/environmental costs in
interests under the objective to reach the the calculation of the logistics costs (e.g.
optimal performance level of the defined based on carbon assessments) will be real-
system. But depending on the number of ity in the future and the logistics cost will,
actors involved, the existence of different ceteris paribus, increase. Logistics service
power-positions and the level of collabora- providers already develop the capabilities
tion between them, such arrangements can to support their clients in taking actions to
result in very complex contracts. reduce these types of costs associated with
• Logistics service providers are ‘value-add- the provision of logistics services.
ing partners’ of the clients in terms of con- • Effectiveness: Strategic decisions such as
tributors to the achievement of the clients’ those in the context of the globalization of
objectives. the sales markets and the supply markets
are often made under the participation of
The latter role of logistics service providers is external service providers – typically con-
the subject of the next section. sulting companies. As described above, lo-
gistics service providers – particularly 3PL
the Impact of logistics Services and 4PL – nowadays also offer this type
on Supply chain Performance of service. Although the final decisions are
made by the management of the clients, lo-
Defining ‘Supply Chain Performance’ as the ca- gistics service providers influence the de-
pability of a supply chain to create, to transform cision making processes and consequently
and to deliver value to customers; the following the effectiveness of the client’s business
describes the multi-dimensional impact of logistics system. Without getting into detail, it is im-
services on supply chain performance in terms of portant to mention that several types of lo-
influencing cost, effectiveness, efficiency, and gistics services (e.g. network engineering)
also the creation of intangible assets: can initiate future costs but also can avoid
future cost (e.g. restructuring of the logis-
• Cost: The direct profit impact of logis- tics network). By influencing the effec-
tics services is generally measured by the tiveness of the client’s business, logistics
367
Logistics Services in the 21st Century
services can have a significant impact on a With an increasing recognition of the impor-
company’s policy and future development tance of logistics services for the company and
due to their often strategic character. chain performance also an enhanced value propo-
• Efficiency: Logistics services which are part sition of logistics service providers is observable.
of the primary value-adding activities like Customers expect balanced total value across cost,
those described in the value chain of Porter quality, speed, and responsiveness, but increas-
(Porter 1987) directly contribute to the effi- ingly also environmental aspects. As logistics
ciency of the client’s value/supply chain. By services affect all these competitive parameters,
influencing the efficiency, logistics services they can contribute to secure and to strengthen
can contribute to avoid costs (e.g. avoid- the competitive position of their clients. Due to
ance of production downtime and reduc- this, not just cost – even when the total cost of
tion of inventory), to ensure the quality of ownership are taken into consideration – should
the processes and products (e.g. avoidance be the focus in evaluating the supply chain per-
of product obsolescence and deterioration, formance of logistics services (Stock & Zinszer
improvement of order fill-rates), to influ- 1987; West 1997).
ence time-related objectives in a positive The modality of how logistics service providers
way (e.g. reduction of throughput, storage, can improve supply chain performance depends
and lead time), and also to improve the en- to a large extent on the architecture of the service
vironmental performance of the client, e.g. offerings – this subject will be addressed in the
by minimizing the carbon emission via op- next section.
timized route planning or by selecting sus-
tainable carriers.
• Creation of Intangible Assets: Logistics ser- the archItecture of
vices with a direct contact to the end cus- logIStIcS ServIce offerIngS
tomer (the customer of the logistics service
customer) can support the creation of intan- Using three different levels of system aggregation,
gible assets in terms of ‘customer satisfac- the following part addresses how today’s logistics
tion’ and ‘customer loyalty’. Based on their service providers deliver value to supply chains
execution performance and their capabili- by developing single logistics services (service
ties, logistics service providers consequent- architecture), their logistics service program
ly can directly contribute to the creation of (service program architecture) and finally, their
competitive advantages for their customers. organizational form on the market (service pro-
Another way how logistics services support vider architecture).
the client in creating intangible assets is the
transfer of the image or reputation of the the Service architecture: Primary
service provider to the client. The perceived Services and Secondary Services
competences of a logistics service provider
can consequently be used as a surrogate for The view of the service architecture refers to the
the client’s capabilities and improve his im- market appearance of the logistics service offering
age on the markets. This is closely related and provides information about its components in
to findings of Kraljic who stresses logistics the case of demand. Depending on their degree of
performance as an important criterion to independence, logistics services offerings can be
evaluate the power-relation between buyer differentiated in ‘primary services’ and ‘secondary
and seller (Kraljic 1988). or value-added services’.
368
Logistics Services in the 21st Century
Primary services are independently marketable primary services a company is offering – based
sales offerings, which are the core part of the con- on this criterion providers exist who offer just one
tract between logistics service provider and client. primary service (single-service program) while
Secondary services on the other hand are offered others provide several primary services (service
in linkage with primary services and are directed bundles).
to them. On the basis of Kotler, Figure 6 visual- The term homogeneous service bundles indi-
izes the relation between primary and secondary cates that a logistics service provider offers several
services in form of a shell model. services around one functional task of logistics
If the offering of secondary services is a legal (service group) as described in Table 1. In the
requirement or market standard (order qualifier) case of the service group ‘transportation’ it could
they are denoted as obligatory secondary services for example mean that the service program of a
which are by definition an integral part of the service provider contains air, land, sea, and rail transport.
architecture. If their offering is not compulsory; This example demonstrates a typical way to di-
these services are called facultative secondary versify the service program of a logistics service
services. Not being a market standard, logistics
provider – a function (here transportation) is kept
services providers can differentiate themselves
as the nucleus of the program, being expanded by
and realize competitive advantages based on them
the transport mode. Another option is to extend
(order winner).
the service program by diversifying the type of
Figure 7 demonstrates in a simplified way a
goods being transported (e.g. reefer cargo, heavy
logistics services bundle consisting of a primary
service and two secondary services. But as typically cargo, bulk cargo, etc.).
also materials and rights become part of a market But given the nature of logistics projects
offering, logistics service providers finally offer initiated by specific problem statements of the
in many cases ‘product bundles’ with tangible customers, the service program architecture often
and intangible components. Despite this fact, the represents heterogeneous service bundles contain-
following explanations will focus on pure logistics ing for example a combination of the functions
service offerings. of transportation, cargo handling, storage, and
consulting. This phenomenon is in accordance
the Service Program with the current market offerings of 3PL- and
architecture: homogeneous 4PL-providers and indicates again that the general
and heterogeneous Bundles scope of modern logistics tasks is not based on a
single function but represents a cross-functional
In addition to the above described relation between approach in the context of the management of
primary and secondary services, logistics service material and information flows, from which range
offerings can also differ based on the number of heterogeneous bundles are frequently required.
369
Logistics Services in the 21st Century
370
Logistics Services in the 21st Century
• Logistics Specialists: autonomous logis- In the context of logistics service interaction pro-
tics service providers offering of a single- cesses, two transaction types can be distinguished
service program (e.g. truck transportation (see Figure 8): single service transactions (‘Case
company); 1’) and service bundle transactions (‘Case 2’).
• Logistics Full-Service Providers: au- Single service transactions describe a transac-
tonomous logistics service providers of- tion type in which a customer requires exactly one
fering homogeneous or heterogeneous specific service (resource, capability; r1) to solve a
service bundles (e.g. freight forwarding problem (P). As demonstrated in Figure 8, this does
company); not exclude that the service provider possesses this
• Logistics Service Networks: cooperative problem-solving capability in an almost identical
(inter-organizational) logistics service of- specification (e.g. skills, equipment). The evalua-
ferings managed by a focal organization tion of this case leads to the following results:
(e.g. cooperation of SME, 4PL).
• The buying company just acquires resources
Led by the question ‘Which are the pros and it actually needs (‘lean purchasing’).
cons of each alternative?’ and focusing on the po- • Bureaucratic restraints with negative impact
tential value for the customers, these alternatives on the transaction times are rare.
will be described and evaluated below. • Uncertainty regarding the competence of the
service provider is limited due to the service
Logistics Specialists provider‘s degree of specialization.
• High costs due to the quality of the service
Logistics Specialists are autonomous logistics ser- can be expected. This effect can be compen-
vice providers who offer a single-service program sated by economies of scale.
within a functional service group. In the ideal case, • The degree of utilization of the service
the service offering is a result of a ‘concentration provider can cause problems, resulting in
on core competencies’ which results in a reduced higher supply risks in terms of potential
but high-quality product range. The service offer- bottlenecks and/or more complexity for the
ing in general is limited by the marketability of the supply function of the client due to a neces-
service, which represents an economic limitation sary expansion of the supply base.
of the degree of specialization.
371
Logistics Services in the 21st Century
The second transaction type refers to a situation supplier relationships, and increasing pro-
in which a comprehensive problem shall be solved cess costs as well as longer process times.
through the purchase of several – autonomously Advantages regarding the quality can be
provided – services (r1 and r2) which consequently compensated by these negative effects.
form a homogenous or heterogeneous service
bundle. To successfully realize such a transaction, The use of Logistics Specialist for service
the customer needs to hold two internal resources: bundle transactions consequently seems only
‘decomposition-knowledge (d)’ to de-compose a recommendable for problems characterized by a
comprehensive problem into several (marketable) sequential structure (e.g. logistics services along a
partial problems, as well as ‘composition- and chain) or in situations when the required services
coordination-knowledge (c)’ to integrate partial are unconnected concerning temporal aspects
problem solutions to a problem-solution. This and content. But, based on the above mentioned
‘Case 2’ is characterized by the following pros reasons, the strengths of Logistics Specialists are
and cons: single service transactions.
372
Logistics Services in the 21st Century
Using the two transaction types described buyer had prior experience with the Full-
above, ‘Case 3’ demonstrates that the term ‘Full- Service Provider (modified rebuy).
Service Provider’ does not necessarily mean that • The use of further resources of the Full-
the full-service is always provided; the term cor- Service Provider – particularly the focal
responds to the resources which in their combina- center –in general leads to higher costs.
tion determine the range of capabilities to solve • The Full-Service Provider’s size and the
comprehensive problems. degree of utilization of all resources can
A single service transaction between service also lead to higher costs.
provider and customer as demonstrated in ‘Case
3’ differs from ‘Case 1 – Single Service Transac- The assessment of ‘Case 4’ comes to the fol-
tion with a Logistics Specialists’ due to the ‘Focal lowing result:
Center’, a broker who centralizes the resources
‘decomposition-knowledge of problems (d)’ and • In comparison with ‘Case 2 – Service Bundle
‘composition- and coordination-knowledge of par- Transaction with a Logistics Specialist’, it
tial problem solutions (c)’. As a consequence, this is not necessary that the buying company
center encompasses two additional capabilities: provides resources for the (de-)composi-
it provides the front-office processes in interac- tion and coordination. Therefore the use
tion with the customer and also coordinates the of a Full-Service Provider can lead to a re-
service provision. duction of interfaces and less coordination
Zooming into the resource-structure of the focal effort for the client, to a decrease of com-
center in the case of demand for a service bundle, plexity and uncertainty within the buying
Figure 10 shows the linkage between the focal company and finally to a positive impact
center and the used resources (service components) on costs and duration of the transaction.
in terms of an active intra-organizational network. • But diametrical effects can occur, if the
The ‘network-knowledge (x)’, another capability Full-Service Provider’s company size re-
necessary to be provided by the focal center, shall sults in bureaucratic company structures,
ensure the internal coordination. Evaluating ‘Case which in turn can lead to an increase in
3’ leads to this conclusion: transaction time and higher costs.
• The perceived supply risk of the buying The strength of Full-Service Providers is
company can subjectively be lower, if the finally the offering of service bundle transac-
373
Logistics Services in the 21st Century
tions. To cover competences at the ‘border of the network platform presenting the potential of the
Full-Service Provider’, sometimes independent network on the market should be highly stable
specialists are hired (e.g. consultants). Tempo- to provide a concrete point of reference for the
rarily, these actors become integral parts of the supplier-identification. The transaction-network
Full-Service Provider as sub-contractors. This responsible for the service provision in the specific
phenomenon shows a smooth transition to inter- case of demand and often just temporarily formed
organizational networks is consequently less stable.
In deference to the service offering of Full-
Logistics Service Networks Service Providers, the legal independence between
the actors in a Logistics Service Network can be
While Service Specialists as well as Full-Service highlighted, even if the economic dependency
Providers can be regarded as established organi- can be high. As demonstrated in Figure 11, the
zational forms in the provision of logistics ser- transaction structures of ‘Case 5’ and ‘Case 6’ are
vice offerings, Logistics Service Networks are a similar to the corresponding ones of Full-Service
comparably new form. Such inter-organizational Providers. But, as the network consists of legally
networks allow on the one hand a specialization independent actors, each resource can be a sell-
of the network members based on the principles ing center itself; hence the functions of the focal
of division of work and on the other hand an center in the Full-Service Provider architecture
integration of single services to service bundles. are performed by a focal organization.
Typically, Logistics Service Networks consist of Compared with ‘Case 1 – Single Service
legally independent actors and are managed by a Transaction with a Logistics Service Specialist’,
focal organization. so far the preferable organizational form when
To classify networks, management literature single service transactions are to be performed,
uses the criterion ‘stability of the configura- Logistics Service Networks have the advantage
tion’ with the main characteristics ‘stable’ and that multiple resources of the same type reduce the
‘unstable’ (Sydow 1999.; Hess 1998). The use supply risk of the customer. But on the other hand,
of this criterion seems also to be suitable in the potential disadvantages result from comparable
context of Logistics Service Networks: The longer process times and increased costs.
Figure 11. Logistics service networks (based on Voigt & Thiell 2003)
374
Logistics Services in the 21st Century
375
Logistics Services in the 21st Century
Engel, A., Schmidt, K. A., & Geraedts, S. (2003). Hess, T. (1998): Unternehmensnetzwerke – Ab-
Fourth Party Logistics Service Provider (4PL) – grenzung, Ausprägung und Entstehung (in Eng-
Osnabrück, Germany: Ein Neues Logistikkonzept lish: Business Networks – Classification, Char-
(in English: Fourth Party Logistics Service Pro- acteristics, and Development). In: Arbeitspapiere
vider – A new Logistics Concept). der Abt. Wirtschaftsinformatik II der Universität
Göttingen, Nr. 4/1998, Göttingen.
Freiling, J. (1995). Die Abhängigkeit der Zu-
lieferer.Wiesbaden, Germany: Ein strategisches Ketchen, D. J., & Hult, T. M. (2007). Bridging
Problem (in English: The Dependency of Sup- Organization Theory and Supply Chain Manage-
pliers – A Strategic Problem). ment – The Case of Best Value Supply Chains.
Journal of Operations Management, 25, 573–580.
Gadde, L.-E., & Jellbo, O. (2002). System Sourc-
doi:10.1016/j.jom.2006.05.010
ing – Opportunities and Problems. European Jour-
nal of Purchasing and Supply Management, 8(1), Klaas, T. (2002). Logistik-Organisation: Ein
43–51. doi:10.1016/S0969-7012(01)00013-2 konfigurationstheoretischer Ansatz zur logistiko-
rientierten Organisationsgestaltung (in English:
Gebhardt, A. (2006). Entscheidung zum Out-
Organisation of Logistics – A Configuration-
sourcing von Logistikleistungen – Rationalität-
theoretic Approach for the Logistics-oriented
sanforderungen und Realität in mittelständischen
Design of Organizations), Wiesbaden, Germany:
Unternehmen (in English: The Outsourcing Deci-
Springer/Verlag.
sion of Logistics Services – Rational Requirements
and the Reality in Medium-sized Companies), Kotler, P. (1988). Marketing-Management – Anal-
Wiesbaden, Germany: Springer/Verlag yse, Planung und Kontrolle (in English: Marketing
Management – Analyzing, Planning, and Control-
Hagberg-Andersson, Å., Kock, S., & Åhman, S.
ling), 4th Ed., Stuttgart, Germany: Verlag.
(2000). Managing Buyer-Supplier Relationships
in a Supply Network – The Buyer’s Perspective. Kraljic, P. (1988). Zukunftsorientierte Beschaf-
In: Proceedings of the 2000 International Mar- fungs- und Versorgungsstrategie als Element
keting and Purchasing Conference, Bath, The der Unternehmensstrategie (in English: Future-
Netherlands. oriented Procurement- and Supply-Strategy as
Element of the Corporate Strategy). In: Henzler,
Håkansson, H. (1982). International Marketing
H.A. (Ed.),Handbuch Strategische Führung, Wi-
and Purchasing of Industrial Goods – An Inter-
esbaden, Germany, (pp. 477-497).
action Approach. Chichester, UK: Håkansson,
H., & Johanson, J. (1992). A Model of Industrial Kuehne & Nagel (2008, February 27). Kuehne-
Networks. In Axelsson, B., & Easton, G. (Ed.). Nagel Lead Logistics Solutions – Supply Chain
Industrial Networks – A New View of Reality, Management & Sustainable Development. Pre-
London, (pp. 28-34). sentation of A. Quillaud in Luxemburg.
Håkansson, H., & Snehota, I. (1995). Developing Kumar, S., & Malegeant, P. (2006). Strategic Al-
Relationships in Business Networks. London: liance in a Closed-loop Supply Chain – A Case of
Routledge. Manufacturer and Eco-non-profit Organization.
Technovation, 26(10), 1127–1135. doi:10.1016/j.
Heizer, J., & Render, B. (2008). Operations
technovation.2005.08.002
Management, 9th Ed., Upper Saddle River,
NJ:Prentice Hall.
376
Logistics Services in the 21st Century
Latin America Logistics Center. (2005): Análisis Stock, J. R., & Zinszer, P. H. (1987). The In-
de Costo total de Logística en Empresas Colom- dustrial Purchase Decision for Professional Ser-
bianas 2004-2005 (in English: Analysis of the vices. Journal of Business Research, 15(1), 1–16.
Total Cost of Logistics in Colombian Companies doi:10.1016/0148-2963(87)90014-2
2004-2005), Bogotá, Columbia.
Sydow, J. (1999). Management von Netzwer-
Lee, H. L., Padmanabhan, V., & Whang, S. (1997). korganisationen – Zum Stand der Forschung (in
The Bullwhip Effect in Supply Chains. Sloan English: Management of Network Organisations
Management Review, 38(3), 93–102. – State of the Art). In: Sydow, J. (Ed.): Manage-
ment von Netzwerkorganisationen, Wiesbaden,
Loren, G. (2005). Network vs. Network – The
Germany (pp. 279-314).
New Arena of Competition. InHarvard Business
Review ‘Supply Chain Strategy’, Reprint No. Thiell, M. (2008). Strategische Beschaffung von
P0503D. Dienstleistungen (in English: Strategic Supply
Management of Services), Saarbrücken, U.S.
Maister, D. H., & Lovelock, C. H. (1982). Man-
International Trade Commission (2005). Logistic
aging Facilitator Services. Sloan Management
Services – An Overview of the Global Market and
Review, 23(4), 9–20.
Potential Effects of Removing Trade Impediments.
Marasco, A. (2008). Third-party Logistics – A Lit- Investigation No. 332-463. Washington, DC.
erature Review. International Journal of Produc-
Voigt, K.-I., & Thiell, M. (2003). Beschaffung wis-
tion Economics, 113(1), 127–147. doi:10.1016/j.
sensintensiver Dienstleistungen – Net Sourcing als
ijpe.2007.05.017
alternative Bezugsform (in English: Procurement
Morgenstern, O. (1955). Note on the Formulation of Knowledge-based Services – Net Sourcing
of the Theory of Logistics. Naval Research Logis- as Alternative Approach). In: Bruhn, M./Stauss,
tics Quarterly Review, 2, 129–136. doi:10.1002/ B. (Ed.): Dienstleistungsnetzwerke, Wiesbaden,
nav.3800020303 Germany (pp. 287-318).
Porter, M. E. (1987). Wettbewerbsstrategie – Meth- Voigt, K.-I., & Thiell, M. (2004). Industrielle Rück-
oden zur Analyse von Branchen und Konkurrenten nahme- und Entsorgungssysteme – Eine modellge-
(in English: Competitive Strategy – Methods to stützte Analyse alternativer Organisationsformen
Analyze Industries and Competitors), 4th Ed., am Beispiel der Automobilindustrie (in English:
Frankfurt/New York: Robinson, P. J., Faris, C. Industrial Reverse Logistics Systems – A Model-
W., & Wind, Y. (1967). Industrial Buying and based Analysis of Alternative Organizational Forms
Creative Marketing, Boston: Schmitt, A. (2006). Using the Example of the Automotive Industry). In:
4PL-providing als strategische Option für Kon- Prockl, G./Bauer, A./Pflaum, A./Müller-Steinfahrt,
traktlogistikdienstleister – Eine konzeptionell-em- U. (Ed.): Entwicklungspfade und Meilensteine
pirische Betrachtung (in English: 4PL-provision moderner Logistik – Skizzen einer Roadmap,
as Strategic Option for Contract Logistics Provid- Wiesbaden, Germany (pp. 389-418).
ers – A Conceptual-empirical View). Wiesbaden,
Wegner, U. (1993). Organisation der Logistik
Siebert, H. (1999). Ökonomische Analyse von
– Prozess- und Strukturgestaltung mit neuer
Unternehmensnetzwerken (in English: Economic
Informations- und Kommunikationstechnik (in
Analysis of Business Networks). In: Sydow, J.
English: Organization of Logistics – Process- and
(Ed.): Management von Netzwerkorganisationen.
Structure-design with Modern Information and
Wiesbaden, Germany (pp. 7-27).
Communcation Technology), Berlin, Germany.
377
Logistics Services in the 21st Century
378
379
Compilation of References
Abate, G., & Moser, C. (2003). E-commerce and Internet Agarkar, A. (2007). Warehouse Voice Picking. Re-
use in small businesses: Trends and issues. (Staff paper trieved May 5, 2007, from http://blogs.oracle.com/
2003-04). Michigan State University, Department of logistics/2007/05/warehouse_voice_picking.html
Agricultural Economics. Retrieved June 28, 2009, from
Agarwal, R., & Sambamurthy, V. (2002). Principles and
http://www.aec.msu.edu/pubs.htm
models for organizing the information technology func-
Aberdeen Group. (2009). Aberdeen Group. Retrieved tion. MIS Quarterly Executive, 1(1), 1–16.
June 28, 2009, from http://www.aberdeen.com/
Agrawal, G. K., & Berg, D. (2007). Technology in the ser-
Abramson, N. (1970). The ALOHA System - An- vice development process: A missing dimension. Interna-
other alternative for computer communications. In tional Journal of Services Technology and Management,
Proceedings of AFIPS Fall Joint Computation Con- 8(2/3), 107–122. doi:10.1504/IJSTM.2007.012863
ference, 37, 281-285. Retrieved from http://doi.acm.
Air Transport Research Society. (2002–2005). Airport
org/10.1145/1478462.1478502
Benchmarking Report: Global Standards for Airport Ex-
Ackoff, R. L. (1974). Redesigning the Future: a systems cellence - Part 1, 2 and 3. Vancouver, Canada: ATRS.
approach to societal problems. New York: John Wiley
Airos, E., Korhonen, R., & Pulkkinen, T. (2007). Satel-
& Sons.
liittipaikannusjärjestelmät (Satellite navigation systems).
Ackoff, R. L., & Sasieni, M. W. (1968). Fundamentals of The Finnish Defence Forces. Riihimäki. Retrieved June
Operations Research. New York: John Wiley & Sons. 5, 2009 from http://www.mil.fi/laitokset/pvtt/satelliit-
tipaikannus.pdf
Adams, G. (2007). Pharmaceutical manufacturing: RFID-
reducing errors and effort. Filtration & Separation, 44(6), Akkaya, K., & Younis, M. (2005). A survey on routing
17–19. doi:10.1016/S0015-1882(07)70179-9 protocols for wireless sensor networks. Ad Hoc Networks,
3(3), 325–349. doi:10.1016/j.adhoc.2003.09.010
Adams, M., Bates, D., Coffman, G., & Everett, W. (2008).
Saving lives, saving money: The imperative for comput- Akyildiz, I. F., Su, W., Sankarasubramaniam, Y., &
erized physician order entry in Massachusetts Hospital. Cayirci, E. (2002). A survey on sensor networks. Commu-
Retrieved February 27, 2009, from http://www.nehi.net/ nications Magazine, IEEE, 40(8), 102–114. doi:10.1109/
publications/8/saving_lives_saving_money_the_im- MCOM.2002.1024422
perative_for_computerized_physician_order_entry_in_
Alberts, D. S., Garska, J. J., & Stein, F. P. (1999). Net-
massachusetts_hospitals
work Centric Warfare: Developing and Leveraging
Adebanjo, D. (2003). Classifying and selecting e-CRM ap- Information Superiority. Retrieved April 2, 2009, from
plications: An analysis-based proposal. Management De- http://www.nps.edu/Academics/Centers/CEP/docs/
cision, 41(6), 570–577. doi:10.1108/00251740310491517 Alberts_NCW.pdf
Copyright © 2010, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Compilation of References
Albrecht, K. (1998). La Revolución del servicio. 3R Anderson, M., Banker, R., & Ravindran, S. (2006). Value
Editores LTDA. Implications of Investments in Information Technology.
Management Science, 52(9), 1359–11367. doi:10.1287/
Albrecht, K., & Zemke, R. (1985). Service America.
mnsc.1060.0542
New York:Mc.Graw Hill.
ANEC & BEUC. (2008). Radio frequency identification
Alex, J., & Jumar, U. (2005). Simulation zum integ-
(RFID). Retrieved June 28, 2009, from http://www.anec.
rierten Prozessentwurf von Abwassersystemen, GWF
eu/attachments/ANEC-ICT-2008-G-017final.pdf
Wasser/Abwasser, 145(2005), Nr.10. http://simba.ifak.
eu/simba/ Angeles, R. (2005). RFID technologies: supply-chain
applications and implementation issues. Information
Alexander, C., Pearson, J. M., & Crosby, L. (2003). The
Systems Management, 22(1), 51–65. doi:10.1201/1078/4
transition to e-commerce: A case study of a rural-based
4912.22.1.20051201/85739.7
travel agency. Journal of Internet Commerce, 2(1), 49–63.
doi:10.1300/J179v02n01_05 Anonymous,. (2003). 10 emerging technologies that will
change the world. MIT’s Technology Review, 106(1),
Aligning CoBiT 4.1. (2008). Aligning CoBiT 4.1., ITIL
33–49.
V3 and ISO/IEC 27002 for Business Benefit, A Manage-
ment Briefing From ITGI and OGC. Rolling Meadows, Appelfeller, W., & Buchholz, W. (2005). Supplier Rela-
IL: IT Governance Institute. Retrieved March 8, 2009, tionship Management: Strategie, Organisation und IT
from http://www.isaca.org des modernenen Beschaffungsmanagements. Wiesbaden,
Germany: Gabler.
Àlvarez, C., et al. (2004). Efficient and reliable high level
communication in randomly deployed wireless sensor Appiah, A., & Agyemang, F. (2004). Electronic Retail
networks. In Proceedings of the second international Payment Systems: User Acceptability and Payment
workshop on Mobility management & wireless access Problems in Ghana, School of Management, Business
protocols (pp. 10information and communication Administration, Blekinge Institute of technology. Ble-
technologies (ICTs)Information technologyOperating kinge, Sweeden.
system (OS)6-110).
Artemis (2008). European Technology Platform, Em-
Ambler, T., (2004). Why Financial Managers Need To bedded Intelligence and Systems, Retrieved fromhttp://
Think About Marketing, Corporate Finance Review. www.artemis.eu/
Jul/Aug, 9(1), 14-21
Arumugam, D., & Ambravaneswaran, V. (2008). 2D
Anastasi, G., Conti, M., Francesco, M., & Passarella, A. localization using SAW-based RFID systems: a single
(2009). Energy conservation in wireless sensor networks: antenna approach. Int. J. RFID Technology and Applica-
A survey. Ad Hoc Networks, 7(3), 537–568. doi:10.1016/j. tions., 1(4), 417–438.
adhoc.2008.06.003
Askin, R., Goldberg, J., Goetschalckx, M., Kuo, W.,
Andal-Ancion, A., Cartwright, P. A., & Yip, G. S. (2003). Rardin, R., & Wysk, R. (2004). IE curriculum renova-
The digital transformation of traditional businesses. Sloan tion. Panel discussion, Industrial Engineering Research
Management Review, (Summer): 34–41. Conference, Houston, TX.
Anderson, J. C., Hakansson, H., & Johanson, J. (1994). Avison, D. E., & Young, T. (2007). Time to rethink health
Dyadic business relationships withing a business care and ICT? Communications of the ACM, 50(6), 69–74.
network context. Journal of Marketing, 58(4), 1–15. doi:10.1145/1247001.1247008
doi:10.2307/1251912
Avriel, M., Penn, M., Shpirer, N., & Witteboon, S.
(1998). Stowage planning for container ships to reduce
380
Compilation of References
the number of shifts. Annals of Operations Research, ers in Crete. British Food Journal, 104(8), 580–590.
76, 55–71. doi:10.1023/A:1018956823693 doi:10.1108/00070700210425976
Axelsson, B., & Wynstra, F. (2002). Buying Business Barras, R. (1990). Interactive Innovation in Financial and
Services. Chichester, UK: Wiley-Blackwell. Business Service: The vanguard of the service revolu-
tion. Research Policy, 19, 215–237. doi:10.1016/0048-
Ayers, J., (2003, July). Don’t get buried in customer data-
7333(90)90037-7
use it. Harvard Business School Working Knowledge,
July 21st. Barratt, M. (2004). Understanding the meaning of
collaboration in the supply chain. Supply Chain
Aznar, J. (2006) Jerónimo Aznar Bellver-Dialnet, [en
Management: An International Journal, 9(1), 30–42.
línea], Retrieved July 30, 2066, http://dialnet.uniroja.es/
doi:10.1108/13598540410517566
servlet/extaut?codigo=336[07.30.2006]
Bartens, S. (2008). China setzt auf Ausbau, Logistik auf
Baker, C. R., et al. (2007). Wireless sensor networks for
den Punkt, Heft 6.
home health care. In Proceedings of the 21st International
Conference on Advanced Information Networking and Bates, D. W., Leape, L. L., Cullen, D. J., Laird, N.,
Applications Workshops, 2, 832-837. Petersen, L. A., & Teich, J. M. (1998). Effect of com-
puterized physician order entry and a team intervention
Baker, K., & Scudder, G. (1990). Sequencing with Ear-
on prevention of serious medication errors. Journal of
liness and Tardiness Penalties: A Review. Operations
the American Medical Association, 280(15), 1311–1316.
Research, 38(1), 22–36. doi:10.1287/opre.38.1.22
doi:10.1001/jama.280.15.1311
Bakos, Y. J., & Brynjolfsson, E. (1993). Information
Bazuin, B. J., Atashbar, M. Z., & Kirishnamurthy, S.
technology, incentives, and the optimal number of sup-
(2004, January 4-7). A prototype burst transceiver for
pliers. Journal of Management Information Systems,
SAW sensors interrogation, International Conference
10(2), 37–53.
on Intelligent Sensing and Information Processing (pp.
Ballou, R. H. (1985). Business Logistics – Management 190-195), Chennai, India.
Planning and Control. Englewood Cliffs, NJ: Bauer.
Beamon, B. (1998). Supply Chain Design and Analysis:
Ballou, R. H. (2004). Business Logistics/Supply Chain Models and Methods. International Journal of Produc-
Management – Planning, Organizing, and Controlling tion Economics, 55(3), 281–294. doi:10.1016/S0925-
the Supply Chain.Upper Saddle River, New Jersey: 5273(98)00079-6
Prentice Hall.
Beamon, B. (1999). Measuring supply Chain Performance.
Banerjee, S., & Basu, A. (1993). Model type selection in an InternationalJournalofOperations&ProductionManage-
integrated DSS environment. Decision Support Systems, ment, 19(3), 275–292. doi:10.1108/01443579910249714
9(1), 75–89. doi:10.1016/0167-9236(93)90024-W
Bebko, C. P. (2000). Service intangibility and its
Banker, R. D., Kalvenes, J., & Patterson, R. A. (2000). impact on consumer expectations of service qual-
Information technology, contract completeness, and ity. Journal of Services Marketing, 14(1), 9–26.
buyer-supplier relationships. Paper presented at the doi:10.1108/08876040010309185
Twenty-First International Conference on Information
Bechini, A., Cimino, M. G. C. A., Marcelloni, F., &
Systems.
Tomasi, A. (2007). Patterns and technologies for en-
Baourakis, G., Kourgiantakis, M., & Migdalas, A. (2002). abling supply chain traceability through collaborative
The impact of e-commerce on agro-food marketing: The e-business. Information and Software Technology, 50(4),
case of agricultural cooperatives, firms, and consum- 342–359. doi:10.1016/j.infsof.2007.02.017
381
Compilation of References
Bechteler, T. F., & Yenigün, H. (2003). 2-D Localiza- innovation. Sloan Management Review, 47(2), 56–63.
tion and Identification Based on SAW ID-Tags at 2.5
Bertalanffy, L. V. (1976). General system theory: Founda-
GHz. IEEE Trans, MTT, 51(5), 1584–1590. doi:10.1109/
tions, development, applications. Revised edition, New
TMTT.2003.810142
York: George Braziller Inc.
Bednarz, A. (2001) Gartner: CRM deployment plans
Bertsimas, D. J., & Simchi–Levi, D. (1996). A new
holding steady, Computer World, September, http://www.
generation of vehicle routing research: Robust algo-
computerworld.com/action/article.do?command=viewA
rithms addressing uncertainty. Operations Research,
rticleBasic&articleId=64179
44, 286–304. doi:10.1287/opre.44.2.286
Beesley, A. (1996). Time compression in supply chain.
Bettman, J. R. (1973). Perceived risk and its components:
Industrial Management & Data Systems, 96(2), 12–16.
A model and empirical test. JMR, Journal of Marketing
doi:10.1108/02635579610112606
Research, 10(May), 184–190. doi:10.2307/3149824
Bellido, L. (2004). Metodología para la Evaluación de
Beuscart-Zephir, M. C., Pelayo, S., Degoulet, P., Anceaux,
Servicios de Telecomunicaciones desde la perspectiva
F., Guerlinger, S., & Meaux, J. J. (2004). A usability
del usuario. Dpto. de Ingeniería de Sistemas Telemáticos,
study of CPOE’s medication administration functions:
Universidad Politécnica de Madrid.
Impact on physician-nurse cooperation. Sudies in Health
Belton, V., & Gear, T. (1983). On a Short-Coming of Technologies and Informatics, 107(2), 1018–1022.
Saaty’s Method of Analytic Hierarchies. Omega, 11(3),
Bhatt, G., & Grover, V. (2005). Types of information
228–230. doi:10.1016/0305-0483(83)90047-6
technology capabilities and their role in competitive
Benbasat, I., Goldstein, D. K., & Mead, M. (1987). The advantage: an empirical study. Journal of Management
case research strategy in studies of information systems. Information Systems, 22(2), 253–277.
MIS Quarterly, 11(3), 369–386. doi:10.2307/248684
Bielli, M., Boulmakoul, A., & Rida, M. (2006). Object
Benedetto, J., & Ferreira, P. (2000). Modern Sam- oriented model for container terminal distributed simula-
pling Theory: Mathematics and Applications. Boston: tion. European Journal of Operational Research, 175,
Birkhauser. 1731–1751. doi:10.1016/j.ejor.2005.02.037
Benjamin, R., & Wigand, R. (1995). Electronic market Biemans, F. P. M., Lankhorst, M. M., Teeuw, W. B., & van
and virtual value chains on the information superhighway. de Wetering, R. G. (2001). Dealing with the complexity
Sloan Management Review, 36(2), 62–72. of business systems architecting. Systems Engineering,
4(2), 118–133. doi:10.1002/sys.1010
Bensky, A. (2004), Short-range wireless Communica-
tion: Fundamentals of RF system design and application Bilderbeek, Hertog, P. D., & Marklund, G. (1998). Service
(second edition), New York: Elsevier innovation: knowledge intensive business service as
cooproducers of innovation .The Result of SIS Synthesis
Berkowitz, B. (2001, April 20). Technology catches up
Paper 3, 1.
to runners. Washington Post, sec. E, pg.1.
Biohealthmatics.com. (2006). Pharmacy information
Berry, L. L., & Parasuraman, A. (1991). Marketing
systems. Retrieved February 27, 2009, from http://www.
Services: Competing through Quality. New York: Free
biohealthmatics.com/technologies/his/pis.aspx
Press.
Bitner, M. J. (2001). Self-service technologies: What
Berry, L. L., Shankar, V., Parish, J. T., Cadwallader, S., &
do customers expect? Marketing Management., 10(1),
Dotzel, T. (2006). Creating new markets through service
10–12.
382
Compilation of References
Bitner, M. J., Booms, B. H., & Tetreault, M. S. (1990). Bowersox, D. J., Class, D. J., & Cooper, M. B. (2007).
The service encounter: Diagnosing favorable and unfa- Supply chain logistics management. (2nd ed.). Boston,
vorable incidents. Journal of Marketing, 54(January), MA: McGraw-Hill/Irwin.
71–84. doi:10.2307/1252174
Bowersox, D. J., Closs, D. J., & Helferich, O. K. (1986).
Bitner, M., J., Brown, S., Meuter, M. (2000). Logistical Management – A Systems Integration of Physi-
Technology infusion in service encounters. Acad- cal Distribution, Manufacturing Support, and Materials
emy of Marketing Science Journal., 28(1), 138–150. Procurement, 3rd Ed., New York: MacMillan.
doi:10.1177/0092070300281013
Boyson, S., Corsi, T., & Verbraeck, A. (2003). The
Blackburn, J. D. (1990). Time-based competition: the e-supply chain portal: A core business model. Trans-
next battleground in American manufacturing. New portation Research, 39, 175–192. doi:10.1016/S1366-
York: McGraw-Hill. 5545(02)00046-7
BMBF - Bundesministerium für Bildung und Forschung. Brady, M. (2005, September). The role of information
(2007). IKT2020 - Forschung für Innovationen. Retrieved technology in marketing: Crucial but overlooked and
fromhttp://www.bmbf.de/de/9069.php underexploited. In Proceedings of the Irish Academy of
Management Conference, Galway, CD Rom.
BMVBS - Bundesministerium für Verkehr. Bau und
Stadtentwicklung (2009). Masterplan - Güterverkehr und Brady, M. K., & Cronin, J. J. (2001). Some New Thougths
Logistik. Retrieved from http://www.bmvbs.de/Verkehr/ on Conceptualizing Perceived Service Quality: A Hier-
Gueterverkehr-Logistik-,2829/Masterplan.htm archical Approach. Journal of Marketing, 65(3), 34–49.
doi:10.1509/jmkg.65.3.34.18334
Bogataj, D., & Bogataj, M. (2007). Measuring the sup-
ply chain risk and vulnerability in frequency space. Brady, M., & Fellenz, M. R. (2007, August), The Ser-
International Journal of Production Economics, 108, vice Paradox: Supporting Service Supply Chains with
291–301. doi:10.1016/j.ijpe.2006.12.017 Product-Orientated ICT’, IEEE/Informs Soli Interna-
tional Conference on Service Operations, Logistics and
Booms, B., & Bitner, M. J. (1981). Marketing strategies and
Informatics, Philadelphia.
organization structures for service firms, In J. Donnelly
and W. George (Eds), Marketing of Services, American Brady, M., Fellenz, M. R., & Brookes, R. (2008). The
Marketing Association. Chicago, Il. history of Information and Communication Technolo-
gies (ICT) with the marketing domain: Reframing the
Bose, I., & Pal, R. (2005). Auto-id: managing anything,
ICT dimension within the CMP framework. Journal
anywhere, anytime in the supply chain. Communications of
of Business and Industrial Marketing, 23(2), 108–114.
the ACM, 48(8), 100–106. doi:10.1145/1076211.1076212
doi:10.1108/08858620810850227
Boshoff, C. R. (1997). An experimental study of
Brady, M., O’Connor, M., & Saren, M. (2006, July).
service recovery options. International Journal
Marketers for the 21st Century Need ICT Education,
of Service Industry Management, 8(2), 110–130.
In Academy of Marketing Conference, University of
doi:10.1108/09564239710166245
Middlesex, Brady, M., Saren, M., & Tzokas, N., (2002).
Boukerche, A. (2008). Algorithms and protocols for wire- Integrating Information Technology into Marketing
less sensor networks. New York: John Wiley & Sons. Practice: The IT Reality of Contemporary Marketing
Practice. Journal of Marketing Management, 18(5-6),
Bowersox, D. J., & Daugherty, P. J. (1995). Logistics
555–578.
paradigms: the impact of information technology. Journal
of Business Logistics, 16(1), 65–80. Bramel, J., & Simchi-Levi, D. (1997). The logic of lo-
gistics. New York: Springer.
383
Compilation of References
Brandl, M., Schuster, S., Scheiblhofer, S., & Stelzer, A. Burt, R. S. (1992). Structural holes: the social structure
A new Anti-Collision Method for SAW tags using Linear of competition. Cambridge, MA: Harvard University
Block Codes, 2008 IEEE International Frequency Control Press.
Symposium, 284-289
Business Week. (1999, August 30). 21 ideas for the 21st
Brennan, S. (2005). NHS IT project: The biggest computer century. Retrieved April 1, from http://www.business-
programme in the world...ever! Oxford, UK: Radcliffe week.com/1999/99_35/2121_content.htm
Medical Press.
Buzacott, J. A. (1996). Commonalities in reengineered
Brethon, P., MacHulbert, J., & Pitt, L. (2005). Consum- business processes: Models and issues. Management
ing technology: Why marketers sometimes get it wrong. Science, 42(5), 768–782. doi:10.1287/mnsc.42.5.768
California Management Review, 48(1), 110–128.
Cahnson, S. (1998), Electronic Payment Systems Hand-
Brown, P., Hartmann, C., et al. (2007). Asset Tracking on book of Cyberspace Center, Hong Kong University of
the International Space Station Using Global SAW Tag Science & Technology, Retrieved from http://www.cyber.
RFID Technology, 2007 IEEE Ultrasonics Symposium, ust.hk/handbook7/hb7main.html
New York, (pp. 72 – 75).
Calaminus, G. (1994). Netzwerkansätze im Investi-
Browne, J., Chan, W. W., & Rathmill, K. (1985). An tionsgütermarketing – Eine Weiterentwicklung multi-
integrated FMS design procedure. In Annals of Opera- organisationaler Interaktionsansätze? (in English:
tions Research, 3, K.E. Stecke & R. Suri (Eds.), Basel- Network Approaches in Industrial Marketing – A Fur-
Switzerland: J.C. Baltzer, 207-238. ther Development of Multi-organizational Interaction
Approaches?). In: Kleinaltenkamp, M., & Schubert,
Bruno, F. (2006, July). Executing an IP Protection
K. (Eds.), Netzwerkansätze im Business-to-Business-
Strategy in a SaaS Environment. Contract Management.
Marketing – Beschaffung, Absatz und Implementierung
Magazine, NCMA, USA.
neuer Technologien, Wiesbaden, pp. 93-124.
Brynjolfsson, E., & Yang, S. (1996). Information tech-
Calder, A., & Watkins, S. (2006). International IT Gov-
nology and productivity: A review of the literature.
ernance [London: Kogan Page.]. An Executive Guide to
Advances in Computers, 43, 179–214. doi:10.1016/S0065-
ISO, 17799(I), SO27001.
2458(08)60644-0
Callaway, E. H. (2004). Wireless sensor networks: archi-
Bulst, W.-E., Fischerauer, G., & Reindl, L., choll, G.,
tectures and protocols. New York: CRC Press.
et al. (2001). State of the art in wireless sensing with
surface acoustic waves. IEEE Transactions on Industrial Callaway, E., Hsu, S., & Shankar, R. (2002). JAN: A
Electronics, 48(2), 265–271. doi:10.1109/41.915404 communications model for wireless sensor networks,
Technical Report, TR-CSE-02-12, Boca Raton, FL: De-
Bunduchi, R. (2005). Business relationships in internet-
partment of Computer Science and Engineering, Florida
based electronic markets: The role of goodwill trust and
Atlantic University.
transaction costs. Information Systems Journal, 15(4),
321–341. doi:10.1111/j.1365-2575.2005.00199.x Cannon-Bowers, J. A., & Salas, E. (2001). Reflection on
shared cognition. Journal of Organizational Behavior,
Burgess, R. (1998). Avoiding supply chain management
22, 195–202. doi:10.1002/job.82
failure: lessons from business process re-engineering.
International Journal of Logistics Management, 9(1), Cantú, H. (2001). Desarrollo de una Cultura de Calidad.
15–23. doi:10.1108/09574099810805717 New York: McGraw Hill.
Burns, L. R. (2002). The health care value chain: Cao, X., Chen, J., Zhang, Y., & Sun, Y. (2008). Develop-
Producers, purchasers, and providers. San Francisco: ment of an integrated wireless sensor network micro-
Jossey-Bass.
384
Compilation of References
environmental monitoring system. ISA Transactions, Chapman, R. L., Soosay, C., & Kandampully, J. (2002).
47(3), 247–255. doi:10.1016/j.isatra.2008.02.001 Innovation in logistics and the new business model: a
conceptual framework. Managing Service Quality, 12(6),
Carbone, L. P., & Haeckel, S. H. (1994). Engineering
358–371. doi:10.1108/09604520210451849
customer experiences. Marketing Management, 3(3),
8–19. Chase, A. Jacobs. (1998). Production and Operations Man-
agement. Eighth edition, New York: McGraw Hill.
Carlzon, J. (1987). Moments of Truth. Cambridge, MA:
Ballinger Publishing Co. Chau, S. (2003). The use of e-commerce amongst thirty-
four Australian SMEs: An experiment or a strategic
Cartenì, A., Cantarella, G. E., & de Luca, S. (2005). A
business tool? Journal of Systems and Information
simulation model for a container terminal. In Proceed-
Technology, 7(1), 49–66.
ing of the European Transport Conference (ETC) 2005,
Strasbourg, France. Chen, C.-Y., & Hsieh, T.-W. (2002, July). A time–space
network model for the berth allocation problem. 19th IFIP
Cascarino, R. E. (2007). Auditor’s Guide to Information
TC7 Conference on System Modeling and Optimization,
Systems Auditing, Hoboken, NJ: J.Wiley & Sons.
Cambridge, UK, 1999.
Cassel, P., Eddy, C., & Price, J. (2002). Aprendiendo
Chen, F. (2005). Explanation of the new concept of modern
Microsoft Access. Pearson Educación.
logistics services. Journal of Storage Transportation &
Cedillo, M., Sanchez, J., & Sanchez, C. (2006). The new Preservation of Commodities, 1, 10–12.
relational schemas of inter-firms cooperation: the case of
Chen, J. S., & Tsou, H. T. (2007). Information technology
the Coahuila automobile cluster in Mexico. International
adoption for service innovation practices and competi-
Journal of Automotive Technology and Management,
tive advantage: the case of financial firms. Information
6(4), 406–418. doi:10.1504/IJATM.2006.012233
research: an international electronic journal, 12(3), 314.
Ceken, C. (2008). An energy efficient and delay sensitive Retrieved April 3, 2009, from http://InformationR.net/
centralized Mac protocol for wireless sensor networks. ir/12-3/paper314.html
Computer Standards & Interfaces, 30(1-2), 20–31.
Chen, R., Sun, C., Helms, M., & Kennyjih, W. (2008).
doi:10.1016/j.csi.2007.06.001
Aligning information technology and business strategy
Chadha, B. (1995). A model driven methodology for with a dynamic capabilities perspective: A longitudinal
business process engineering. In Proceedings of the study of a Taiwanese semiconductor company. Inter-
ASME Computers in Engineering Conference. national Journal of Information Management, 28(5),
366–378. doi:10.1016/j.ijinfomgt.2008.01.015
Chakravorty, R. (2006). A programmable service archi-
tecture for mobile medical care. In Proceedings of the Chen, S. J., & Hwang, C. L. (1991) Fuzzy Multiple
4th Annual IEEE International Conference on Pervasive Atribute Decision Making: Methods and Applications.
Computing and Communications Workshops (PerCom Lecture Notes in Economics and Mathematical Systems,
‘06), pages 532-536. No. 375. Berlin, Germany.
Chan, Y. (2005). Location, transport, and land-use: Chen, S.-C., & Chen, H.-H. (2007). Implementation
Modelling spatial-temporal information. Heidelberg, and application of RFID EPC information service for
Germany: Springer. forward and reverse logistics. Journal of Global Business
Management, 2(2).
Chan, Y., & Ponder, R. (1979). The small package air
freight industry in the United States: A review of the Cheng, H. K., Demirkan, H., & Koehler, G. (2003). The
Federal Express experience. Transportation Research, Price and Capacity Competition of Application Services
13, 221–229. doi:10.1016/0191-2607(79)90048-7 Duopoly. Information Systems and e-Business Manage-
ment. 1(2).
385
Compilation of References
Chesbrough, H. W. (2004). A failing grade for the in- Chopra, S., & Meindl, P. (2007). (3rd ed.). Supply chain
novation academy. Financial Times (North American management. Upper Saddle River, NJPrentice Hall.
Edition), (September): 25.
Choy, K. L., So, S. C. K., Lau, H. C. W., Kwok, S. K.,
Chesbrough, H. W. (2005). Towards a new science of & Chan, F. T. S. (2006). Development of an integrated
services. In Breakthrough ideas for 2005. Harvard Busi- logistics information system for third party logistics
ness Review, 83(1), 16–17. facilitators. International Journal of Business Per-
formance Management, 8(2/3), 170–193. doi:10.1504/
Cheung, R. K., Li, C.-L., & Lin, W. (2002). Interblock
IJBPM.2006.009035
crane deployment in container terminals. Transportation
Science, 36(1), 79–83. doi:10.1287/trsc.36.1.79.568 Chr, P. H. (2004). Logistiksysteme – Betriebswirtschaftli-
che Grundlagen. Berlin Heidelberg: Springer-Verlag
Chiang, C.-C. (2001). Encapsulating legacy systems
for use in heterogeneous computing environments. Chris, K., Naveen, S., & David, W. (2004). TinySec:
Information and Software Technology, 43(8), 497–507. a link layer security architecture for wireless sensor
doi:10.1016/S0950-5849(01)00160-4 networks. In Proceedings of the 2nd International Con-
ference on Embedded Networked Sensor Systems, New
Chiang, C.-C. (2007). Software modernization of legacy
York: ACM Press.
systems for web services interoperability. In Mario Freire
and Manuela Pereira (Ed.), Encyclopedia of Internet Christopher, M. (1992). Logistics and supply chain man-
Technologies and Applications. Hershey, PA: Idea Group agement: Strategies for reducing costs and improving
Publishing. services. London: Pitman Publishing
Chiasserini, C. F., & Rao, R. R. (2000). Routing pro- Chu, S.-C., Leung, L. C. Y., Hui, V., & Cheung, W. (2007).
tocols to maximize battery efficiency. In Proceedings Evolution of e-commerce web sites: A conceptual frame-
of MILCOM: 21st Century Military Communications work and a longitudinal study. Information & Manage-
Conference, 1, 496-500. ment, 44, 154–164. doi:10.1016/j.im.2006.11.003
Chin, T. H. A. (1997). Implications of Liberalization on Chung, K., Choi, Y. B., & Moon, S. (2003). Toward
Airport Development and Strategy in the Asia Pacific. efficient medication error reduction: Error-reducing
Journal of Air Transport Management, 3, 125–131. information management systems. Journal of Medical
doi:10.1016/S0969-6997(97)00020-3 Systems, 27(6), 553–560. doi:10.1023/A:1025937916203
Choi, Y. S. (2000). Simulator for Port Container Termi- Clarke, R. (1998). Electronic Data Interchange (EDI):
nal Using An Object-Oriented Approach. PhD thesis, An Introduction. Retrievedfrom http://www.rogerclarke.
Quality System Analysis Lab., Industrial Engineering, com/EC/EDIIntro.html
Pusan National University.
Claro, D. P. (2004). Managing business networks
Chong, C. Y., & Kumar, S. P. (2003). Sensor Networks: and buyer-supplier relationships. Wageningen, The
Evolution, Opportunities, and Challenges. Proceed- Netherlands:Wageningen University
ings of the IEEE, 91(8), 1247–1256. doi:10.1109/
Cobi, T. 4.1. Executive Summary Framework (2007)
JPROC.2003.814918
ISACA. Rolling Meadows, IL. Retrieved March from
Choobineh, J. (1991). A diagramming technique for repre- http://www.isaca.org
sentation of linear models. OMEGA International Journal
Coetzee, M., & Eloff, J. H. P. (2007). Web services Ac-
of Management Science, 19(1), 43–51. doi:10.1016/0305-
cess Control Architecture Incorporating Trust. Internet
0483(91)90033-P
Research, 17(3). doi:10.1108/10662240710758939
386
Compilation of References
Cohen, W. M., & Levinthal, D. A. (1990). Absorptive Cullen, S., Seddon, P., & Willcocks, L. (2005). Managing
Capacity: A New Perspective on Learning and Innova- IT outsourcing: The life cycle imperative. MIS Quarterly
tion. Administrative Science Quarterly, 35(1), 128–152. Executive, 4, 229–244.
doi:10.2307/2393553
Cunningham, L. F., Gerlach, J., & Harper, M. D. (2004).
CORBA. (2009). CORBA. Retrieved March 9, 2009, from Assessing perceived risk of consumers in Internet airline
http://www.corba.org reservations services. Journal of Air Transportation,
9(1), 21–35.
Corbett, C. J., Blackburn, J. D., & Van Wassenhove, L.
N. (1999). Partnerships to improve supply chains. Sloan Curran, J., & Meuter, M. (2005). Self-service tech-
Management Review, 40(4), 71–82. nology adoption: comparing three technologies.
Journal of Services Marketing, 19(2), 103–114.
Corbin, J., & Strauss, A. (1990). Grounded theory research:
doi:10.1108/08876040510591411
Procedures, canons, and evaluative criteria. Qualitative
Sociology, 13(1), 3–21. doi:10.1007/BF00988593 Currie, W. (1996). Organizational structure and the
use of information technology: Preliminary findings
Cornell Database Group. (2009). Cougar: The Network Is
of a survey in the private and public sector. Interna-
the Database. Retrieved April 2, 2009, from http://www.
tional Journal of Information Management, 16(1), 51–64.
cs.cornell.edu/bigreddata/cougar/index.php
doi:10.1016/0268-4012(95)00061-5
Council on Competitiveness. (2004, December). In-
Curtis, B., Kellner, M. I., & Over, J. (1992). Process
novate America: thriving in a world of challenge and
modeling. Communications of the ACM, 35(9), 75–90.
change. Presented at Global Innvation Ecosystem 2007
doi:10.1145/130994.130998
Symposium.
Daft, R. L., & Lengel, R. H. (1984). Information rich-
Coyle, J. J. Langley, Jr., Gibson, B. J., Novack, R. A., &
ness: A new approach to managerial behafviour and
Bardi, E. J. (2009). (8th ed.). Supply chain management:
organization design. In B.M. Staw & L.L. Cummings
A logistics perspective. Florence, KY: South-Western
(eds.), Research in organizational behaviour, 6, 191-233.
Cengage Learning.
JAI Press.
Craig, D. R., & Gabler, W. K. (1940). The competitive
Daft, R. L., & Macintosh, N. B. (1981). A tentative expla-
struggle for market control. The Annals of the American
nation into the amount and equivocality of information
Academy of Political and Social Science, 209, 84–107.
processing in organizational work units. Administrative
doi:10.1177/000271624020900112
Science Quarterly, 26, 207–224. doi:10.2307/2392469
Cronin, J. J., & Taylor, S. (1992). Measuring Service
Daft, R. L., Lengel, R. H., & Trevino, L. K. (1987, Septem-
Quality: A Reexamination and Extension. Journal of
ber). Message equivocality, media selection, and manager
Marketing, 56(July), 55–68. doi:10.2307/1252296
performance: Implications for information systems. MIS
Cronin, J. J., & Taylor, S. a. (1994). SERVPERF ver- Quarterly, ▪▪▪, 355–366. doi:10.2307/248682
sus SERVQUAL: Reconciling performance based
Dağtaş, S., Pekhteryev, G., Şahinoğlu, Z., Çam, H., &
and perceptions-minus-excpectations measurement
Challa, N. (2008). Real-Time and Secure Wireless Health
of service quality. Journal of Marketing, 58, 125.
Monitoring. International Journal of Telemedicine and
doi:10.2307/1252256
Applications, 2008, Article ID 135808, 10 pages
Crosby, P. (1984). Quality Without Tears. New York:
Davenport, T. (2006). Competing on Analytics. Harvard
McGraw Hill.
Business Review, (January): 99–107.
387
Compilation of References
Davenport, T. H. (1993). Process Innovation: Reengineer- Operational Risk Manager. InProceedings of the Lalonde
ing Work Through Information Technology. Cambridge, 9th International Research Seminar in Service Manage-
MA: Harvard Business School Press. ment, 178-203.
Davenport, T. H. (1998). Putting the enterprise into the Debely, J., Dubosson, M., & Fragnière, E. (2007). The
enterprise system. Harvard Business Review, 76(4), Pricing of Knowledge-based services: Insights from the
121–131. Environmental Sciences, New Delhi 2nd International
Conference on Services Management. Retrieved from
Davenport, T. H., & Grover, V. (2001). ‘Special issue;
http://ssrn.com/abstract=951651
Knowledge management. Journal of Management Infor-
mation Systems, 18(1), 3–4. Dehning, B., Richardson, V. J., & Zmud, R. W. (2007). The
financial performance effects of IT-based supply chain
Davenport, T. H., & Harris, J. G. (2005). Automated
management systems in manufacturing firms. Journal
decision making comes of age. Sloan Management
of Operations Management, 25, 806–824. doi:10.1016/j.
Review, 46(4), 83–89.
jom.2006.09.001
Davenport, T. H., & Short, J. E. (1990). The new indus-
Dellenbarger, L. E., Dillard, J., Schupp, A. R., Zapata, H.
trial engineering: Information technology and business
O., & Young, B. T. (2006). Socioeconomic factors associ-
process redesign. Sloan Management Review, 31(4),
ated with at-home and away-from home catfish consump-
11–27.
tion in the United States. Agribusiness, 2, 35–46.
Davenport, T. H., Harris, J. G., & Kohli, A. K. (2001).
Demirhan, D., Jacob, V., & Raghunathan, S. (2006).
‘How do they know their customers so well? Sloan
Information technology investment strategies under
Management Review, (Winter): 63–73.
declining technology cost. Journal of Management
Davenport, T., Hammer, M., & Metsisto, T. (1989). How Information Systems, 22(3), 321–350. doi:10.2753/
executives can shape their companies’ information sys- MIS0742-1222220311
tems. Harvard Business Review, 67(5), 130–134.
Dempsey, P. S., & O’Connor, K. (1997). Air Traffic Con-
Day, G. S. (2006). Aligning the organization with the gestion and Infrastructure Development in the Pacific
market. Sloan Management Review, 48(1), 41–49. Asia Region. In Findley, C., Chia L.S, and Singh, K.
(Eds), Asia Pacific Air Transport – Challenges and Policy
DCOM. (2009). DCOM. Retrieved March 9, 2009, from
Reforms. Institute of Southeast Asian Studies.
http://msdn.microsoft.com/en-us/library/ms809340.
aspx DHL. (n.d.). Logbook in cooperation with Technische
Universtat Darmstadt.Retrieved from http://www.
de Haan, J., Kisperska-Moron, D., & Placzek, E. (2007).
dhl-discoverlogistics.com/cms/en/course/technologies/
Logistics management and firm size: A survey among Pol-
connection/edi.jsp
ish small and medium enterprises. International Journal
of Production Economics, 108, 119–126. doi:10.1016/j. Ding, Q., Dong, L., & Kouvelis, P. (2007). On the inte-
ijpe.2006.12.009 gration of production and financial hedging decisions
in global markets. Operations Research, 55, 470–489.
de Luca, S., Cantarella, G. E., & Cartenì, A. (2008). A
doi:10.1287/opre.1070.0364
macroscopic model of a container terminal based on
diachronic networks. Schedule-Based Modeling of Trans- Dodgson, M., Gann, D., & Salter, A. (2008) The Manage-
portation Networks. Wilson, Nuzzolo (Ed.). Springer. ment of Technological Innovation, Strategy and Practice.
Oxford, UK: Oxford University Press.
Debely, J., Dubosson, M., & Fragnière, E. (2006). The
Travel Agent: Delivering More Value by Becoming an
388
Compilation of References
Dominick, C. (2008). Supplier Partnerships: Your End of Dyer, J. H., & Singh, H. (1998). The relational view:
the Deal. Retrieved from http://www.nextlevelpurchas- Cooperative strategy and sources of interorganizational
ing.com/articles/supplier-partnership.html competitive advantage. Academy of Management Review,
23(4), 660–679. doi:10.2307/259056
Dowling, G. R., & Staelin, R. (1994). A model of perceived
risk and risk-handling activities. The Journal of Consumer Edgar, J. R. (1995, July 9-11). World Air Cargo Forecast.
Research, 21(June), 119–134. doi:10.1086/209386 A paper presented at the conference on Air Transport
in the Asia Pacific – Challenges, Opportunities and Op-
Drammeh, L., House, L., Sureshwaran, S., & Selassie, H.
tions, Singapore.
(2002, July). Analysis of factors influencing the frequency
of catfish consumption in the United States. In Proceed- Edmonson P. J., & Campbell C. K. (2004). Encoded SAW
ings of the 2002 American Agricultural Economics As- RFID tags and sensors for multi-user detection using
sociation Annual Meeting. Long Beach, CA. IDT finger phase modulation US6827281
Drucker, P. (1954). The Practice of Management, New Eisenhardt, K. M. (1989). Building theories from case
York and Evanston: Harper & Row study research. Academy of Management Review, 14(4),
532–550. doi:10.2307/258557
Drucker, P. F. (1985). Innovation and entrepreneurship:
practice and principles, New York: Harper & Row. El Sheikh, A. A. R., Paul, R. J., Harding, A. S., & Balmer,
D. W. (1987). A microcomputer-based simulation study of
Du, W. (2005). A pairwise key predistribution scheme
a port. The Journal of the Operational Research Society,
for wireless sensor networks. ACM Transactions
38(8), 673–681.
on Information and System Security, 8(2), 228–258.
doi:10.1145/1065545.1065548 Elson, J., Girod, L., & Estrin, D. (2002). Fine-grained
network time synchronization using reference broad-
Dubosson, M., Fragnière, E., & Millet, B. (2006). A Con-
casts. ACM SIGOPS Operating Systems Review, 36(SI),
trol System Designed to Address the Intangible Nature
147-163.
of Service Risks. In Proceedings of the Shanghai IEEE
International Conference on Service Operations and Encyclopedia (2007). Service Level Agreement. Re-
Logistics and Informatics (June), 90-95. trieved fromhttp://www.nationmaster.com/encyclope-
dia/Service-Level-Agreement European Committee
Duclos, L., Vokurka, R., & Lummus, R. (2003). Con-
for Standardization (2007). CEN Horizontal European
ceptual Model of Supply Chain Flexibility. Industrial
Service Standardization Strategy (CHESS). Retrieved
Management Data Systems, 103(6), 446-456.Eiglier, P.
from http://www.cen.eu/cenorm/sectors/nbo/value/
& Langeard, E. (1991). El marketing de servicios. New
chesss/index.asp
York: McGraw Hill.
Engel, A., Schmidt, K. A., & Geraedts, S. (2003). Fourth
Dutertre, B., Cheung, S., & Levy, J. (2004). Lightweight
Party Logistics Service Provider (4PL) – Osnabrück,
key management in wireless sensor networks by lever-
Germany: Ein Neues Logistikkonzept (in English:
aging initial trust. Technical Report SRI-SDL-04-02.
Fourth Party Logistics Service Provider – A new Lo-
Retrieved April 3, 2009, from http://www.csl.sri.com/
gistics Concept).
users/bruno/publis/sri-sdl-04-02.pdf
Engel, J. F., Blackwell, R. D., & Miniard, P. W. (1993).
Dwyer, F. R., Schurr, P. H., & Oh, S. (1987). Developing
Consumer Behavior, Chicago, IL: Dryden Press.
buyer-seller relationships. Journal of Marketing, 51(2),
11–27. doi:10.2307/1251126 Engle, C. R., & Quagrainie, K. (2006). Aquaculture mar-
keting handbook. Boston, MA: Blackwell Publishing.
Dyché, J. (2001). The CRM Handbook: A business guide
to customer relationship management. Reading, MA:
Addison-Wesley.
389
Compilation of References
Engle, C. R., Capps, O., Dellenbarger, L., Dillard, J., Fabbe-Costes, N., & Jahre, M. (2008). Supply chain inte-
Hatch, U., Kinnucan, H., & Pomeroy, R. (1990). The U. gration and performance: a review of the evidence. The
S. market for farm-raised catfish: An overview of con- International Journal of Logistics Management, 19(2),
sumer, supermarket, and restaurant surveys. Fayetteville, 130–154. doi:10.1108/09574090810895933
AR: Arkansas Agricultural Experimental Station, 925,
Fachberger, R., & Bruckner, G. (2004). Applicability
Southern Regional Aquaculture Center 511.
of LiNbO3, Langasite and GaPO4 in high temperature
Engle, C. R., Capps, O., Dellenbarger, L., Dillard, J., SAW sensors operating at radio frequencies, IEEE. Trans.
Hatch, U., Kinnucan, H., & Pomeroy, R. (1991). Expand- UFFC, 51(11), 1427–1431.
ing U. S. markets for farm-raised catfish. Arkansas Farm
Fagerberk, J., Mowery, D., & Nelson, R. (2004). The
Research, 40(6), 5–6.
Oxford Handbook of Innovation, New York: Oxford
Enrado, P. (2005). Buyers guide: Pharmacy systems. University Press.
Retrieved February 27, 2009, from http://www.health-
Fellenz, M. R., Augustenborg, C., Brady, M., & Greene,
careitnews.com/story.cms?id=3786
J. (2009). Requirements for an evolving model of sup-
Enterprise JavaBeans. (2009). JavaBeans. Retrieved ply chain finance: A technology and service providers
March 9, 2009, from http://java.sun.com/products/ejb/ perspective. In K.S. Soliman (ed.), Proceedings of the
International Business Information Management Confer-
Enterprise Value. Governance of IT Investments. (2006).
ence: 1171-1179. Cairo, Egypt.
Enterprise Value: Governance of IT Investments, The Val
IT Framework. Rolling Meadows, IL: IT Governance Fellenz, M., & Brady, M. (2008). Managing the Innova-
Institute. Retrieved March 8, 2009, from http://www. tive Deployment of Information and Communication
isaca.org Technologies (ICTs) for Global Service Organizations.
International Journal of Technology Marketing, 3(1),
ENV 12313 Traffic and Traveller Information (TTI). (May
39–55. doi:10.1504/IJTMKT.2008.017339
1996-June 1997). TTI Messages via Traffic Message.
Fenn, J., & Linden, A. (2005). Gartner’s Hype Cycle
EPCglobal. (2009). EPCglobal Standards. Retrieved
Special Report for 2005. Stamfort, CT: Gartner, Inc.
March 6, 2009, from http://www.epcglobalinc.org/
Retrieved February 14, 2008, from http://www.gartner.
standards
com/resources/130100/130115/gartners_hype_c.pdf
European Commission (2006). Sustainable Surface
Fernández, M. (1996). Como medir la calidad en los
Transport – Research Technological Development and
servicios. Información Comercial Española ICE: Revista
Integration, Luxemburg: Office for Official Publications
de economía, 755,113-125.
of the European Communities.
Fichman, R. G. (2001). The role of aggregation in the
European Commission. (2006, October). ICT and e-busi-
measurement of information technology-related orga-
ness in hospital activities: ICT adoption and e-business
nizational innovation. MIS Quarterly, 25(4), 427–455.
activity in 2006. Bonn, Germany: eBusiness Watch.
doi:10.2307/3250990
Evans, J., & Lindsay, W. (2001). The management and
Fink, L., & Neumann, S. (2009). Exploring the perceived
control of quality. Quinta edición, South-Western Col-
business value of the flexibility enabled by information
lege Pub.
technology infrastructure. Information & Management,
Eyholzer, K., Kuhlmann, W., & Münger, T. (2002). 46(2), 90–99. doi:10.1016/j.im.2008.11.007
Wirtschaftlichkeitsaspekte eines partnerschaftlichen
Finn, A. (1985). A theory of the consumer evaluation
Lieferantenmanagements. HMD - Praxis. Wirtschaftsin-
process for new product concepts. Research in Consumer
formatik, 228, 66–76.
Behavior, 1, 35–65.
390
Compilation of References
Fisher, M., Raman, A., & McClelland, A. (2000). Rocket ing and Supply Management, 8(1), 43–51. doi:10.1016/
science retailing is almost here - are you ready? Harvard S0969-7012(01)00013-2
Business Review, 78(4), 115–124.
Galbraith, J., R (2005) “Designing the Customer-Centric
Fleming, R. (2004). Successful supplier relationship Organization: A Guide to Strategy, Structure, and Pro-
management. Retrieved February 27, 2009, from http:// cess, Jossey Bass Business and Management Series
www.ameinfo.com/35411.html
Gallouj, F., & Weinstein, O. (1997). Innovation in Ser-
Flores, A. (2004), Medición de la efectividad de la cadena vice. Research Policy, 26, 537–556. doi:10.1016/S0048-
de suministro. Primera edición, Panorama Editorial. 7333(97)00030-9
Fragniere, E., & Sullivan, G. (2007). Risk management. Galloway, L., Mochrie, R., & Deakins, D. (2004).
Boston, MA: Thomson, Glaser, B., & Strauss, A. (1967). ICT-enabled collectivity as a positive rural busi-
The discovery of grounded theory: Strategies of qualita- ness strategy. International Journal of Entrepre-
tive research, London: Wiedenfeld and Nicholson. neurial Behavior and Research, 10(4), 247–259.
doi:10.1108/13552550410544213
Främling, K. (2002). Tavaravirran seuranta osana
Internet-pohjaista tuotetiedon hallintaa. (Tracking of Gangadharan, G. R., & D’Andrea, V. (2009). Service
deliveries as a part of Internet based product data man- Orientation: Licensing Perspectives. Journal of Interna-
agement). Retrieved April 15, 2009 from http://dialog. tional Commercial Law and Technology., 4(1).
hut.fi/publications/TiekeArtikkeli.pdf
Gardiner, J., Ison, S., & Humphreys, I. (2005). Factors
Franceschini, F., & Cignetti, M. (1998). Comparing tools Influencing Cargo Airlines’ Choice of Airport: An Inter-
for service quality evaluation. International Journal of national Survey. Journal of Air Transport Management,
Quality, 3(4). 11, 393–399. doi:10.1016/j.jairtraman.2005.05.004
Freeman, L. C. (1979). Centrality in social networks: Gaynor, M., Moulton, S., Welsh, M., Rowan, A., La-
Conceptual clarification. Social Networks, 1, 215–239. Combe, E., & Wynne, J. (2004). Integrating Wireless
doi:10.1016/0378-8733(78)90021-7 Sensor Networks with the Grid. IEEE Internet Computing,
8(4), 32–39. doi:10.1109/MIC.2004.18
Freiling, J. (1995). Die Abhängigkeit der Zulieferer.Wies-
baden, Germany: Ein strategisches Problem (in English: Gebhardt, A. (2006). Entscheidung zum Outsourcing von
The Dependency of Suppliers – A Strategic Problem). Logistikleistungen – Rationalitätsanforderungen und
Realität in mittelständischen Unternehmen (in English:
Friend, S. C., & Walker, P. H. (2001). Welcome to the
The Outsourcing Decision of Logistics Services – Ra-
new world of merchandising. Harvard Business Review,
tional Requirements and the Reality in Medium-sized
79(11), 5–11.
Companies), Wiesbaden, Germany: Springer/Verlag
Frohlich, M. (2002). E-integration in the supply chain:
Geoffrion, A. M. (1987). An Introduction to Struc-
Barriers and performance. Decision Sciences, 33(4),
tured Modeling. Management Science, 33(5), 547–588.
537–557. doi:10.1111/j.1540-5915.2002.tb01655.x
doi:10.1287/mnsc.33.5.547
Furukawa, M. F., Raghu, T. S., & Spaulding, T. J. (2008).
German Association for Medical Technology. (2007).
Adoption of health information technology for medication
Elektronisches Beschaffungswesen im Gesundheits-
safety in U.S. hospitals. Health Affairs, 27(3), 865–875.
markt vor dem Durchbruch. Retrieved February 27,
doi:10.1377/hlthaff.27.3.865
2009, from http://www.bvmed.de/themen/E-Commerce/
Gadde, L.-E., & Jellbo, O. (2002). System Sourcing – Op- pressemitteilung/BVMed-Umfrage_Elektronisches_Be-
portunities and Problems. European Journal of Purchas- schaffungswesen_im_Gesundheitsmarkt_vor_dem_Du-
rchbruch.html
391
Compilation of References
Gerrits, J. W. M. (1995). Towards Information Logistics, Govindan, R. (2004). Datacentric routing and storage in
An Exploratory Study of Logistics in Information Produc- sensor networks. In Znati, T., Sivalingam, K., & Raghav-
tion. Amsterdam, The Netherlands: Vrije University. endra, C.S. (eds.), Wireless sensor networks (pp.185-205).
Boston: Kluwer Academic Publishers.
Getto, G., Gantner, T., & Vullinghs, T. (2000). Software
Acquisition: Experiences with Models and Methods. In Grandon, E. E., & Pearson, J. M. (2004). Electronic com-
Proceedings of the EuroSPI. merce adoption: An empirical study of small and medium
US businesses. Science Direct, 42(1), 197-216. Retrieved
Ghiani, G., Laporte, G., & Musmanno, R. (2004) In-
June28, 2009, from http://www.sciencedirect.com
troduction to Logistics Systems Planning and Control.
Chichester: J.Wiley & Sons. Granovetter, M. (1973). The strength of weak ties.
American Journal of Sociology, 78(6), 1360–1380.
Ghosh, A., & Das, S. (2008). Coverage and connectivity
doi:10.1086/225469
issues in wireless sensor networks: A survey. Pervasive
and Mobile Computing, 4(3), 303–334. doi:10.1016/j. Greenyer, A. (2006). Back from the grave: The return of
pmcj.2008.02.001 modelled consumer information. International Journal
of Retail & Distribution Management, 34(3), 212–219.
Gillen, D., & Lall, A. (1997). Developing Measures of
doi:10.1108/09590550610654375
Airport Productivity and Performance: An Application
of Data Envelopment Analysis. Transportation Research Gronroos, C. (1982). Strategic Management and Market-
Part E, Logistics and Transportation Review, 33, 261–273. ing in the Service Sector. Helsingfors: Swedish School
doi:10.1016/S1366-5545(97)00028-8 of Economics and Racine.
Gilmore, A., Gallagher, D., & Henry, S. (2007). E- Grönroos, C. (1984). A service quality model and its
marketing and SMEs: Operational lessons for the marketing implications. European Journal of Marketing,
future. European Business Review, 19(3), 234–247. 18(4), 36–44. doi:10.1108/EUM0000000004784
doi:10.1108/09555340710746482
Gronroos, C. (1984). Strategic Management and Market-
Glazer, R. (1991). Marketing in an information-inten- ing in the Services Sector. Helsingfors: Swedish School
sive environment: Strategic implications of knowl- of Economics and Business Administration.
edge as an asset. Journal of Marketing, 55(4), 1–19.
Grönroos, C. (1994). From Marketing Mix to Re-
doi:10.2307/1251953
lationship Marketing: Towards a Paradigm Shift
Glouberman, S., & Mintzberg, H. (2001). Managing the in Marketing. Management Decision, 32(2), 4–20.
care of health and the cure of disease - Part I: Differentia- doi:10.1108/00251749410054774
tion. Health Care Management Review, 26(1), 56–69.
Gronroos, C. (2006). On defining marketing: Finding
Glover, F., & Laguna, M. (1997). Tabu Search, Norwell, a new roadmap for marketing. Marketing Theory, 6,
MA: Kluwer. 395–417. doi:10.1177/1470593106069930
Gopal, C., & Cypress, H. (1993). Integrated Distribution Grönroos, C. (2007). Service Management and Market-
Management: Competing on customer service, time and ing: Customer Management in Service Competition (3rd
cost. The Business One Irwin. ed.). Chichester, UK: John Wiley and Sons.
GOST. (2009). Geolocalisation optimisation et securi- Grossman, R. J. (2000). The battle to control online
sation du transport de conteneurs. Retrieved March 6, purchasing. Health Forum Journal, 43(1), 18–21.
2009, from http://projet-gost.org/
Grover, V., Fiedler, K. D., & Teng, J. T. C. (1999). The
role of organizational and information technology an-
tecedents in reengineering initiation behavior. Decision
392
Compilation of References
Sciences, 30(3), 749–781. doi:10.1111/j.1540-5915.1999. Hagberg-Andersson, Å., Kock, S., & Åhman, S. (2000).
tb00905.x Managing Buyer-Supplier Relationships in a Supply
Network – The Buyer’s Perspective. In: Proceedings
GS1. (2009). GS1barcode and eCom. Retrieved March
of the 2000 International Marketing and Purchasing
6, 2009, from http://barcodes.gs1us.org/dnn_bcec/
Conference, Bath, The Netherlands.
Default.aspx
Haiyin, L., Xiangdang, W., Yunkai, Z., & Yanling, N.
Guiltinan, J. P. (1987). The price bundling of services: A
(2006). Analysis on the Impetus of 3PL service innova-
normative framework. Journal of Marketing, 51, 74–85.
tion. Journal of Logistic Technology, 5, 15–17.
doi:10.2307/1251130
Håkansson, H. (1982). International Marketing and Pur-
Gulati, R. (2007). Silo busting: How to execute on the
chasing of Industrial Goods – An Interaction Approach.
promise of customer focus. Harvard Business Review,
Chichester, UK: Håkansson, H., & Johanson, J. (1992).
85(5), 98–106.
A Model of Industrial Networks. In Axelsson, B., &
Gulati, R., & Oldroyd, J. B. (2005). The quest for customer Easton, G. (Ed.). Industrial Networks – A New View of
focus. Harvard Business Review, 83(4), 92–101. Reality, London, (pp. 28-34).
Gummesson, E. (2007). Exit services marketing – enter Håkansson, H., & Snehota, I. (1995). Developing Relation-
service marketing. Journal of Consumer Behaviour, ships in Business Networks. London: Routledge.
6(2), 113–142.
Hammer, M., & Champy, J. (1993). Reengineering the
Gunther, O., Tamm, G., & Leymann, F. (2006). Pricing corporation. New York: Harper Business.
Web Services. In Dagstuhl Seminar Proceedings 06291
Han, K., Kauffman, R. J., & Nault, B. R. (2004). Infor-
(The Role of Business Processes in Service Oriented
mation Exploitation and Interorganizational Systems
Architectures).
Ownership. Journal of Management Information Sys-
Guseman, D. S. (1981). Risk perception and risk reduc- tems, 21(2).
tion in consumer services, In: J.H. Donnelly, et al. (Eds).
Han, Q. (2006). Service Innovation of 3PL Company:
Marketing of Services, Chicago: American Marketing
financial logistics. Beijing, China: University of Inter-
Association.
national Business and Economics.
Haartsen, J. C. (2000). The Bluetooth radio sys-
Han, T., Lin, W., Lin, J. M., Wang, W. B., Wu, H. D., Shui,
tem. IEEE Personal Communications, 7(1), 28–36.
Y. A., et al. (2008).Errors of Phase and Group Delays in
doi:10.1109/98.824570
SAW RFID with Phase Modulation. IEEE Ultrasonics
Habermann, A. W. (1978). Dynamically Modifiable Symposium.
Distributed Systems. In Proceedings of a Workshop on
Han, T., Shi, W., & Lu, W. (2003). Reflection of imped-
Distributed Sensor Nets (pp. 111-114). Pittsburgh, PA:
ance-loaded SAW IDT and its application in wireless
Carnegie Mellon University.
information. Chin. J. Electron., 12(2), 185–188.
Haefner, J. (n.d.). Web-based POS? 10 Benefits of Web-
Han, T., Wang, W. B., Lin, J. M., Wu, H. D., Wang, H.,
Based Point of Sale Software. Retrieved from http://www.
& Shui, Y. (2007). Phases of Carrier Wave in a SAW
merchantos.com/web_based_pos_benefits/
Identification Tags. IEEE Ultrasonics Symposium,(pp.
Haenselmann, T. (2006). Sensornetworks. GFDL Wire- 1669-1672)
less Sensor Network textbook. Retrieved April 2, 2009,
Han, T., Wang, W. B., Wu, H. D., & Shui, Y. A. (2008).
from http://www.informatik.uni-mannheim.de/~haensel/
Reflection and Scattering Characteristics of Reflectors
sn_book
in SAW Tags. IEEE Transactions on Ultrasonics, Fer-
393
Compilation of References
roelectrics, and Frequency Control, 55(6), 1387–1390. Client Organizations. In ITsqc Working Paper Series
doi:10.1109/TUFFC.2008.802 CMU-ITSQC-WP-05-001.
Hao, Y., & Foster, R. (2008). Wireless body sensor net- Heinzelman, W., Chandrakasan, A., & Balakrishnan,
works for health-monitoring applications. Physiological H. (2000). Energy-efficient communication protocol
Measurement, 29, 27–56. doi:10.1088/0967-3334/29/11/ for wireless sensor networks. In Proceeding of the 33rd
R01 Hawaii International Conference on System Science,
8, 8020.
Harrop, P., & Das, R. (2009). Wireless Sensor Networks
2009-2019: The new market for ubiquitous sensor net- Heizer, J., & Render, B. (2008). Operations Management,
works (USN). Retrieved April 3, 2009, from ID http:// 9th Ed., Upper Saddle River, NJ:Prentice Hall.
www.idtechex.com/research/reports/wireless_sen-
Helo, P., & Szekely, B. (2005). Logistics information sys-
sor_networks_2009_2019_000212.asp
tems – An analysis of software solutions for supply chain
Hartmann, C. S. (2002). A global SAW ID tag with large co-ordination. Industrial Management & Data Systems,
data capacity. In. Proceedings of the IEEE Ultrasonics 105(1), 5–18. doi:10.1108/02635570510575153
Symposium, 1, 65–69.
Henderson, J. R. (2001). Networking with e-commerce in
Hartmann, C. S. (2004, March 15-19). Design of global rural America. Retrieved June 28, 2009, from http://www.
SAW RFID tag devices. In Proceedings of Second Int. kc.frb.org/RegionalAffairs/Mainstreet/MSE_0901.pdf
Symp. on Acoustic Wave Devices for Future Mobile
Henderson, J., Dooley, F., & Akridge, J. (2004). Internet
Communication Systems., Chiba.
and e-commerce adoption by agricultural input firms.
Hartmann, C. S., & Claiborne, L. T. (March 26-28). Review of Agricultural Economics, 26(4), 505–520.
Fundamental Limitations on Reading Range of Passive doi:10.1111/j.1467-9353.2004.00196.x
IC-Based RFID and SAW-Based RFID, 2007. In Pro-
Herrmann, J., & Hodgson, B. (2001). SRM: Leveraging the
ceedings of IEEE International Conference on RFID,
supply base for competitive advantage. Paper presented
(pp.41 – 48).
at the SMTA International Conference.
Hartmann, C. S., et al. (2004). Anti-collision methods
Herzlinger, R. E. (2006). Why innovation in health care
for global SAW RFID tag systems, IEEE Ultrasonics
is so hard. Harvard Business Review, 84(5), 58–66.
Symposium,(pp. 805-808).
Heskett, J., Sasser, W., & Hart, C. (1990). Service
Hatch, U., Engle, C. R., Zidack, W., & Olowoloyemo,
Breakthroughs: Changing the Rules of the Game, New
S. (1991). Retail grocery markets for catfish. Alabama
York:Free Press
Agricultural Experimental Station Bulletin, 611.
Hess, T. (1998): Unternehmensnetzwerke – Abgrenzung,
Havelena, W. J., & DeSarbo, W. S. (1990). On the mea-
Ausprägung und Entstehung (in English: Business
surement of perceived consumer risk. Decision Sciences,
Networks – Classification, Characteristics, and Develop-
22, 927–939. doi:10.1111/j.1540-5915.1991.tb00372.x
ment). In: Arbeitspapiere der Abt. Wirtschaftsinformatik
Healthcare Information and Management Systems So- II der Universität Göttingen, Nr. 4/1998, Göttingen.
ciety (HIMSS). (2009). What is a management engineer
Heung, V., Wong, M., & Qu, H. (2000). Airport-restaurant
or process improvement professional? Retrieved April
service quality in Hong Kong. The Cornell Hotel and
2009, from www.himss.org.
Restaurant Administration Quarterly, 41(3), 86–96.
Hefley, W., Loesche, E. A., Khera, P., & Siegel, J. (2005). A
Heylighen, F. (2002). Complexity and Information
Framework for Best Practices in the Sourcing Life-cycle:
Overload in Society: Why increasing efficiency leads
The Architecture of the eSourcing Capability Model for
394
Compilation of References
to decreasing control. Draft paper to be submitted to Howard, M., & Worboys, C. (2003). Self-service - a
Information Society, April 12. contradiction in terms or customer-led choice? Journal
of Consumer Behaviour, 2(4), 382–392. doi:10.1002/
Hidaka, K. (2006, April). Trends in Services Sciences
cb.115
in Japan and Abroad. Science & Technology Trends
Quarterly Review, 19, 35–47. Hoyt, J., & Huq, F. (2000). From arms-length to col-
laborative relationships in the supply chain: an evo-
Hill, J. (2000). System architecture directions for net-
lutionary process. International Journal of Physical
worked sensors. SIGOPS Operating Systems Review,
Distribution & Logistics Management, 30(9), 750–764.
34(5), 93–104. doi:10.1145/384264.379006
doi:10.1108/09600030010351453
Hill, T. (1977). On Goods and Services. Review of In-
Huang, T. C., Lai, H. R., & Ku, C. H. (2006). A deploy-
come and Wealth, 23(4). doi:10.1111/j.1475-4991.1977.
ment procedure for wireless sensor networks. Retrieved
tb00021.x
April 5, 2009, from: http://acnlab.csie.ncu.edu.tw/
Holland, C. P., & Naude, P. (2004). The metamorphosis wasn06/CR2/p19.pdf
of marketing into an information-handling problem.
Hubaux, J. P. (2001). Toward self-organized mobile ad
Journal of Business and Industrial Marketing, 19(3),
hoc networks: the Terminodes project. IEEE Communica-
167–177. doi:10.1108/08858620410531306
tions, 39(1), 118–124. doi:10.1109/35.894385
Holloway, S. (2003). Straight and Level: Practical Airline
Huber, G. P., & Daft, R. L. (1987). The information
Economics, 2nd Edition. Hampshire, UK: Aldershot.
environment of organizations. In F. M. Jablin, L. L. Put-
Holmes, T. P., Vlosky, R. P., & Carlson, J. (2004). An nam, K. H. Roberts, & L. W. Porter (eds.), Handbook of
exploratory comparison of Internet use by small wood organizational communication (pp. 130-164). Newbury
products manufacturers in the north Adirondack region Park, CA: Sage.
of New York and the State of Louisiana. Forest Products
Hufbauer, G., Jaggi, G., & Findlay, C. (1995, July 9-11).
Journal, 54(12), 277–282.
Cleaning the Air-Civil Aviation Issues in the Asia Pacific.
Horton, M. A. (2002). Deployment ready multimode A paper presented at the conference on Air Transport
micropower wireless sensor networks for intrusion in the Asia Pacific – Challenges, Opportunities and Op-
detection, classification, and tracking. Proceedings of tions, Singapore.
the Society for Photo-Instrumentation Engineers, 4708,
Huiming, L. (2006). Logistic service and integrated in-
290–295.
novation. China Ocean Shipping Monthly, 6, 71–73.
Horton, R. L. (1976). The structure of decision risk: Some
Humby, C., Hunt, T., & Philips, T. (2008). Scoring points:
further progress. Journal of the Academy of Marketing
How Tesco continues to win customer loyalty (2nd ed.).
Science, 4(4), 694–706. doi:10.1007/BF02729830
London, Kogan Page.
Hossein, M. (2002). Supply Chain: Crisp and Fuzzy
Hyderr, E., Heston, K., & Paulk, M. (2006). The eSourc-
Aspects. International Journal Appl. Math. Computer
ing Capability Model for Service Providers V2.01 (Tech
Science, 12(3), 423–435.
Report), Pittsburgh, PA: Carniege Melon University.
House, L., Hanson, T., Sureshwaran, S., & Selassie, H.
IBM. (n.d.). IBM Research. Retrieved fromhttp://www.
(2003). Opinions of U.S. consumers about farm-raised
research.ibm.com/ssme/
catfish: Results of a 2000-2001 survey. Mississippi
Agricultural and Forestry Experimentation Station Bul- Imai, A., & Nishimurra, E. (2001). Papadimitriou S. The
letin, 1134. dynamic berth allocation problem for a container port.
Transportation Research Part B: Methodological, 35,
401–417. doi:10.1016/S0191-2615(99)00057-0
395
Compilation of References
Imai, A., Nagaiwa, K., & Tat, C. W. (1997). Efficient Jorge, J. D., & de Rus, G. (2004). Cost-Benefit Analysis
planning of berth allocation for container terminals in of Investments in Airport Infrastructure: A Practical
Asia. Journal of Advanced Transportation, 31(1), 75–94. Approach. Journal of Air Transport Management, 10,
doi:10.1002/atr.5670310107 311–326. doi:10.1016/j.jairtraman.2004.05.001
Inmon, W. H. (2002). Building the Data Warehouse. New Jun, L., & Wang, Y. (2007). How to Select the Way and
York: Wiley Computer Publishing. Strategy of logistics enterprise service iInnovation.
Journal of Logistic Technology, 26(1), 14–16.
ITAA. (n.d.). Information technology definition aggrega-
tion.Retrieved April 3, 2009, from itaa Web site: http:// Juran, J. (2001). Manual de Calidad. New York: McGraw
www.itaa.org/es/docs/Information%20Technology%20 Hill.
Definitions.pdf
Jutla, D., Craig, J., & Bodorik, P. (2001). Enabling and
ITAF. A Professional Practices Framework for IT As- measuring electronic customer relationship management
surance (2008) ISACA, Rolling Meadows, IL, Retrieved readiness. Paper presented at the 34th Annual Hawaii
March 8, 2009, from http://www.isaca.org International Conference on System Sciences.
Iyengar, S. S., & Brooks, R. R. (2004). Distributed sensor Kalakota, R., & Robinson, M. (2000). E-Business 2.0
networks. Boca Raton, FL: Chapman & HalVCRC. Roadmap for Success. Reading, MA: Addison-Wesley.
Jablonski, S., & Bussler, C. (1998). Workflow Manage- Kamath, M., & Mize, J. H. (2003). Impact of major driv-
ment, Modeling Concepts, Architecture and Imple- ing forces on IE education and practice. In Proceedings
mentation. London: International Thompson Computer of 2003 Industrial Engineering Research Conference,
Press, ITP. Portland, OR.
Jacoby, J., & Kaplan, L. (1972). The components of Kameoka, A. (2006). Saabisu, seihin, gijyutu inobesyon
perceived risk, In: Venkatesan, M. (Ed.), Proceedings wo yuugou, sousyutu, hukan suru tougougata senryaku
of 3rd Annual Conference Association for Consumer roodo mappingu [An integrated strategic road mapping
Research, Chicago, Il, (pp.382-393). that fuses, creates and surveys service, product and
technical]. Operations research as a management sci-
Jankowicz, A. (1991). Business Research Projects. Lon-
ence research, 51(9), 573-578.
don: Chapman and Hall.
Kandampully, J. (2002). Innovation as the core competen-
Jea, D., & Srivastava, M. B. (2006). A remote medical
cy of a service organization: the role of technology, knowl-
monitoring and interaction system. In Proceedings of
edge and networks. European Journal of Innovation Man-
the 4th International Conference on Mobile Systems,
agement, 5(1), 18–26. doi:10.1108/14601060210415144
Applications, and Services (MobiSys ‘06), Uppsala,
Sweden. Kaplan, S., & Sawhney, M. (2000). E-hub: the new
B2B marketplaces. Harvard Business Review, 78(3),
Johnson, D. L., & Andrews, I. R. (1971). Risky-shift
97–103.
phenomenon as tested with consumer products as
stimuli. Journal of Personality and Social Psychology, Karkkainen, M., & Laukkanen, S., Sarpola, & Kemp-
20(August), 328–385. painen, K. (2007). Roles of interfirm information; systems
in supply chain management. International Journal of
Jones, P., Clarke-Hill, C., Shears, P., Comfort, D., &
Physical Distribution & Logistics Management, 37(4),
Hillier, D. (2004). ‘Radio frequency identification in the
264–286. doi:10.1108/09600030710752505
UK: Opportunities and challenges. International Journal
of Retail & Distribution Management, 32(3), 164–171. Karl, H., & Willig, A. (2003). A short survey of wireless
doi:10.1108/09590550410524957 sensor networks, TKN technical report TKN-03-018.
396
Compilation of References
Retrieved April 3, 2009, from http://www.tkn.tu-berlin. value supply chains. Journal of Operations Management,
de/publications/papers/TechReport_03_018.pdf 25, 573–580. doi:10.1016/j.jom.2006.05.010
Karlof, C., & Wagner, D. (2003). Secure routing in wireless Khurrum, S., & Bhutta y Faizul, H. (2002). Supplier
sensor networks: attacks and countermeasures. In Sensor selection problem: a comparison of the total cost of
Network Protocols and Applications, 2003. Proceedings ownership and analytic hierarchy process approaches.
of the First IEEE. 2003 IEEE International Workshop Supply Chain Management: An International Journal,
on, (pp. 113-127). 7(3), 126–135. doi:10.1108/13598540210436586
Karmarkar, U. (2004). Will you survive the services Kia, M., Shayan, E., & Ghotb, F. (2002). Investigation of
revolution. Harvard Business Review, 82(6), 100–107. port capacity under a new approach by computer simula-
tion. Computers & Industrial Engineering, 42, 533–540.
Karmarkar, U. S., & Apte, U. M. (2007). Operations
doi:10.1016/S0360-8352(02)00051-7
management in the information economy: Informa-
tion products, processes, and chains. Journal of Kim, J., & Park, K. H. (2009). An energy-efficient,
Operations Management, 25, 438–453. doi:10.1016/j. transport-controlled Mac protocol for wireless sensor
jom.2006.11.001 networks. Computer Networks, 53(11), 1879–1902.
doi:10.1016/j.comnet.2009.03.002
Karmarkar, U. S., & Pitbladdo, R. (1995). Service markets
and competition. Journal of Operations Management, Kim, K. H., & Bae, J. W. (1998). Re-marshaling export
12(3-4), 397–412. doi:10.1016/0272-6963(94)00014-6 containers in port container terminals. Computers &
Industrial Engineering, 35(3–4), 655–658. doi:10.1016/
Karn, P. (1990). MACA - A new channel access method
S0360-8352(98)00182-X
for packet radio. ARRL/CRRL Amateur Radio 9th Com-
puter Networking Conference appears in (pp. 134-140). Kim, K. H., & Kim, H. B. (1998). The optimal determina-
London: ARRL. tion of the space requirement and the number of transfer
cranes for import containers. Computers & Industrial
Kasarda, J. D., & Green, J. D. (2005). Air Cargo as an
Engineering 35(3– 4), 427–430.
Economic Development Engine- A Note on Opportunities
and Constraints. Journal of Air Transport Management, Kinnucan, H. W., & Miao, Y. (1999). Media-specific
11, 459–462. doi:10.1016/j.jairtraman.2005.06.002 returns to generic advertising: The case of catfish.
Agribusiness. International Journal (Toronto, Ont.),
Kauniskangas, M. (2007). Asiakkaasta partneri (From
15, 81–99.
customer to partner). Logistiikka – The magazine of Finn-
ish Association of Purchasing and Logistics, Iss. 5. Kinnucan, H., & Venkateswaran, M. (1990). Effects of
generic advertising on perceptions and behavior: the case
Kauremaa, J., & Auramo, J. (2004). Logistiikan säh-
of catfish. Southern Journal of Agricultural Economics,
köisten tieto- ja viestintäteknologioiden hyödyntäminen
22, 137–151.
– Kokemuksia suomalaisista yrityksistä (Utilization of
electronic information and communication technologies Kinnucan, H., Sindelar, S., Wineholt, D., & Hatch, U.
in logistics – Experiences from Finnish companies). (1988). Processor demand and price markup functions for
Technology Review 154/2004. Tekes. catfish: A disaggregated analysis with implications for
the off flavor problem. Southern Journal of Agricultural
Kekäläinen, H. (2006). Logistics technology roadmap for
Economics., 20, 81–92.
e-business. Technology Review 189/2006. Tekes.
Klaas, T. (2002). Logistik-Organisation: Ein kon-
Ketchen, D. J., & Hult, T. M. (2007). Bridging organization
figurationstheoretischer Ansatz zur logistikorientierten
theory and supply chain management: The case of best
Organisationsgestaltung (in English: Organisation of
397
Compilation of References
Logistics – A Configuration-theoretic Approach for the and Eco-non-profit Organization. Technovation, 26(10),
Logistics-oriented Design of Organizations), Wiesbaden, 1127–1135. doi:10.1016/j.technovation.2005.08.002
Germany: Springer/Verlag.
Kumaran, S. (2004). Model driven enterprise. In Pro-
KMI – Korea Maritime Istitute (2000). A Study on the ceedings of the Global EAI Summit, Banff, Canada,
System Design and Operations of Automated Container 166-180.
Terminal. Internal report.
Kuo, W., & Deuermeyer, B. (1998). IE2-the IE curriculum
Koh, P. H., Goh, J. L. K., Ng, H. S., & Ng, H. C. (1994). revisited: Developing a new undergraduate program at
Using simulation to preview plans of a container port Texas A&M University. IIE Solutions, 30(6), 16–22.
operations. Proceedings of the 1994 Winter Simulation.
Kuypers, J. H., Reindl, L. M., Tanaka, S., & Esashi,
Tew, Manivannan, Sadowski, Seila (Ed.).
M. (2008). Maximum Accuracy Evaluation Scheme for
Konstantas, D., Jones, V., & Herzog, R. (2002). Mobihealth Wireless SAW Delay-Lin Sensors. IEEE Transactions on
- innovative 2.5 / 3g mobile services and applications for Ultrasonics Perforlctrics, and Frequency Control, 55(7),
healthcare. Retrieved April 5, 2009, from http://aps.ewi. 1640–1651. doi:10.1109/TUFFC.2008.840
utwente.nl/public/bibliografie/Thessaloniki.pdf
Laaksonen, P., Nelimarkka, P., & Nyman, M. (2004).
Koppel, R., Metlay, J. P., Cohen, A., Abaluck, B., Localio, Logistiikan tulevaisuus Itämeren alueella. Yhteenveto
A. R., & Kimmel, S. E. (2005). Role of computerized asiantuntijoiden kirjoituksista ja keskustelutilaisuudesta
physician order entry systems in facilitating medication 16.8.2004 (The future of logistics in the Baltic Sea area.
errors. Journal of the American Medical Association, The summary of the articles and discussion by experts
293(10), 1197–1203. doi:10.1001/jama.293.10.1197 Aug 16, 2004). Retrieved May 4, 2009, from http://www.
tedim.com/default.asp?file=819
Kotler, P. (1988). Marketing-Management – Analyse,
Planung und Kontrolle (in English: Marketing Manage- Lacity, M. C., Willcocks, L. P., & Feeny, D. F. (1996).
ment – Analyzing, Planning, and Controlling), 4th Ed., The value of selective IT sourcing. Sloan Management
Stuttgart, Germany: Verlag. Review, 37, 13–25.
Kotler, P., Wong, S., & Armstrong, G. (2007). Principles Lacoss, R., & Walton, R. (1978). Strawman design for
of Marketing, 12th International Edition, London: a DSN to detect and track low flying aircraft. In Pro-
Pearson. ceedings of 1978 Distributed Sensor Nets Conference
on, (pp. 41-52).
Kraljic, P. (1988). Zukunftsorientierte Beschaffungs-
und Versorgungsstrategie als Element der Unterneh- LaFollette, R. M. (1995). Design and performance of
mensstrategie (in English: Future-oriented Procure- high specific power, pulsed discharge, bipolar lead acid
ment- and Supply-Strategy as Element of the Corporate batteries. In Proceedings of the 10th Annual Battery
Strategy). In: Henzler, H.A. (Ed.),Handbuch Strategische Conference on Applications and Advances, 43-47.
Führung, Wiesbaden, Germany, (pp. 477-497).
Lai, K. K., & Shih, K. (1992). A study of container berth
Kuehne & Nagel (2008, February 27). Kuehne-Nagel allocation. Journal of Advanced Transportation, 26(1),
Lead Logistics Solutions – Supply Chain Management 45–60. doi:10.1002/atr.5670260105
& Sustainable Development. Presentation of A. Quillaud
Lai, K.-H., Wong, C. W., & Cheng, E. T. C. (2006).
in Luxemburg.
Institutional isomorphism and the adoption of infor-
Kumar, S., & Malegeant, P. (2006). Strategic Alliance in mation technology for supply chain management.
a Closed-loop Supply Chain – A Case of Manufacturer Computers in Industry, 57(1), 93–98. doi:10.1016/j.
compind.2005.05.002
398
Compilation of References
Lam, S. W., Low, J. M. W., & Tang, L. C. (2009). Opera- port. Journal of Air Transport Management, 9, 113–121.
tional Efficiencies across Asia Pacific Airports. Trans- doi:10.1016/S0969-6997(02)00065-0
portation Research Part E, Logistics and Transportation
Lee, S. Y., & Cho, G. S. (2007). A Simulation Study
Review, 45(4), 654–655. doi:10.1016/j.tre.2008.11.003
for the Operations Analysis of Dynamic Planning in
Lankhorst, M., et al. (2005). Enterprise Architecture at Container Terminals Considering RTLS. IEEE Xplore®
Work. New York: Springer Publications. digital library.
Lansford, J., & Bahl, P. (2000). The design and implemen- Lee, Y.-D., & Chung, W.-Y. (2009). Wireless sensor net-
tation of HomeRF: a radio frequency wireless networking work based wearable smart shirt for ubiquitous health and
standard for the connected home. Proceedings of the activity monitoring. Sensors and Actuators. B, Chemical,
IEEE, 88(10), 1662–1676. doi:10.1109/5.889006 140(2), 390–395. doi:10.1016/j.snb.2009.04.040
Laporte, G., Louveaux, F. V., & Mercure, H. (1994). A Leftwich, L. M., Leftwich, J. A., Moore, N. Y., & Roll,
priori optimization of the probabilistic traveling salesman C. R. (2004). Organizational concepts for purchasing
problem. Operations Research, 42, 543–549. doi:10.1287/ and supply management implementation (No. MG-116).
opre.42.3.543 Santa Monica, CA: RAND Corporation.
Laroche, M., & Bergeron, J. & Goutaland. (2003). C. How Legato, P., Gullì, D., Trunfio, R., & Simino, R. (2008).
intangibility affects perceived risk: the moderating role of Simulation at a Maritime Container Terminal: Models
knowledge and involvement. Journal of Services Market- and Computational Frameworks. In Proceedings of the
ing, 17(2), 122–140. doi:10.1108/08876040310467907 22th European Conference on Modelling and Simulation
(ECMS 2008), Nicosia (Cyprus), 261-269.
Laroche, M., Bergeron, J., & Goutaland, C. (2001). A three-
dimensional scale of intangibility. Journal of Service Lehtonen, S., & Plessky, V. (2000). Unidirectional SAW
Research, 4(1), 26–38. doi:10.1177/109467050141003 Transducer for Gigahertz Frequencies. IEEE Trans.
UFFC, 50(11), 1404–1406.
Laroche, M., McDougall, G. H. G., Bergeron, J., &
Yang, Z. (2004). Exploring How Intangibility Affects Lei, L., & Guisheng, W. (2003). Service innovation.
Perceived Risk. Journal of Service Research, 6(4), Tsinghua University Press.
373–389. doi:10.1177/1094670503262955
Leung, Y. T., Caswell, N., & Kamath, M. (2006). The
Latin America Logistics Center. (2005): Análisis de Costo case for the business process engineer. In Proceedings
total de Logística en Empresas Colombianas 2004-2005 of the IEEE International Conference on Service Opera-
(in English: Analysis of the Total Cost of Logistics in Co- tions and Logistics, and Informatics, Shanghai, China,
lombian Companies 2004-2005), Bogotá, Columbia. 1119-1124.
Lau, A. H. L., Lau, H.-S., & Zhou, Y.-W. (2007). A sto- Leung, Y. T., Cheng, F., Lee, Y. M., & Hennessy, J. J.
chastic and asymmetric-information framework for a (2006). A tool set for exploring the value of RFID in a
dominant-manufacturer supply chain. European Journal supply chain. To appear in H. Jung, F. F. Chen, & B. Jeong
of Operational Research, 176, 295–316. doi:10.1016/j. (Ed.), Trends in Supply Chain Design and Management:
ejor.2005.06.054 Technologies and Methodologies. Heidelberg, Germany:
Springer-Verlag.
Lee, H. L., Padmanabhan, V., & Whang, S. (1997). The
Bullwhip Effect in Supply Chains. Sloan Management Levasseur, R. E. (2007). People Skill: Marketing OR/
Review, 38(3), 93–102. MS - A People Problem. Interfaces, 37(4), 383–384.
doi:10.1287/inte.1060.0254
Lee, H., & Yang, H. M. (2003). Strategies for a Global
Logistics and Economic Hub: Incheon International Air-
399
Compilation of References
Levinson, M., (2003, December 1-12). The RFID Impera- Lin, C., & Ho, Y. (2007). Technological Innovation
tive. CIO Magazine. for China’s Logistics Industry. Journal of Technology
Management and Innovation, 2(4).
Levy, M., Powell, P., & Tetton, P. (2001). SMEs: Aligning
IS and the strategic context. Journal of Information Tech- Lin, J. S., & Hsieh, P. (2006). The role of technol-
nology, 16, 133–144. doi:10.1080/02683960110063672 ogy readiness in customers’ perception and adoption
of self-service technologies. International Jour-
Leymann, F., & Altenhuber, W. (1994). Managing busi-
nal of Service Industry Management, 17(5), 497.
ness processes as an information resource. IBM Systems
doi:10.1108/09564230610689795
Journal, 33(2), 326–348.
Lin, L. C. (2009). An integrated framework for the devel-
Li, E. (2008). Supply chain management in China. In The
opment of radio frequency identification technology in
International Cyber Transportation Logistics Conference.
the logistics and supply chain management. Computers
Petit Jean Mountain, AR.
& Industrial Engineering, 57(3), 832–842. doi:10.1016/j.
Li, E. Y., Du, T. C., & Wong, J. W. (2007). Access control cie.2009.02.010
in collaborative commerce. Decision Support Systems,
Little, J. D. C. (2004). Model and Managers: The Concept
43, 675–685. doi:10.1016/j.dss.2005.05.022
of a Decision Calculus. Management Science, 50(12),
Li, G., Yang, H., Sun, L., & Sohal, A. S. (2009). The impact 1841-1853 (a reprint of a paper originally published in
of IT implementation on supply chain integration and Management Science, 1970, 16(8), 75-89).
performance. International Journal of Production Eco-
Liu, D., Ning, P., & Du, W. (2005). Group-based key
nomics, 120(1), 125–138. doi:10.1016/j.ijpe.2008.07.017
pre-distribution in wireless sensor networks. ACM
Li, Q., Ji., X., Shi, W. & Han.- T. (2009). Walsh Matched- Transactions on Sensor Networks, 4(2), 11.
Threshold Filtering in SAW Tag Applications to Provide
Liu, J., Zhao, F., Cheung, P., & Guibas, L. (2004).
Multiple-Access Capability. Journal of Shanghai Jiaotong
Apply geometric duality to energy-efficient non-local
University, 14(6), 681–685. doi:10.1007/s12204-009-
phenomenon awareness using sensor networks. Wire-
0681-3
less Communications, IEEE, 11(6), 62–68. doi:10.1109/
Li, Y. (2008). Service Productivity Improvement and MWC.2004.1368898
Software Technology Support. In Proceedings of 32nd
Liu, L., & Li, H. (2006). How to achieve service inno-
Annual IEEE Computer Software and Applications
vation by logistic enterprise. Logistics Infor Monthly,
Conference, (pp. 807-812).
9, 67–69.
Li, Yanfong, & Pu, Guoan. (2003). Research on the
Logistiikka (2001). Paikannuksen merkitys tavaraliiken-
value of third-party logistics. Journal of Commercial
teessä (The meaning of positioning in cargo transport).
Research. (17), 166-168.
Logistiikka – The Magazine of Finnish Association of
Liao, S., Chem, Y., Liu, F., & Liao, W. (2004). Information Purchasing and Logistic, 6, 36–38.
technology and relationship management: a case study of
Loren, G. (2005). Network vs. Network – The New Arena
Taiwan’s small manufacturing firm. Technovation, 24(2),
of Competition. InHarvard Business Review ‘Supply
97–108. doi:10.1016/S0166-4972(02)00037-8
Chain Strategy’, Reprint No. P0503D.
Liao, W., & Wang, H. (2008). An asynchronous Mac
Lorincz, K. (2004). Sensor networks for emergency
protocol for wireless sensor networks. Journal of Network
response: challenges and opportunities. Pervasive Com-
and Computer Applications, 31(4), 807–820. doi:10.1016/j.
puting, IEEE, 3(4), 16–23. doi:10.1109/MPRV.2004.18
jnca.2007.07.001
400
Compilation of References
Lovelock, C. (2007). Service Marketing: People, Technol- Operations & Production Management, 22(7), 728–740.
ogy, Strategy. Upper Saddle River, NJ: Prentice Hall. doi:10.1108/01443570210433517
Lovelock, C. H. (1983). Classifying Services to Gain MacIntosh, R. (1997). Business process re-engineering:
Strategic Marketing Insights. Journal of Marketing, New applications for techniques of production engineer-
47(3), 9–20. doi:10.2307/1251193 ing. International Journal of Production Economics,
50(1), 43–49. doi:10.1016/S0925-5273(97)89132-3
Lovelock, C. H. (1994). Product Plus: How Product +
Service = Competitive Advantage. New York: McGraw- MacKenzie, M., Laskey, K., McCabe, F., Brown, P., &
Hill. Metz, R. (2006). Reference Model for Service Oriented
Architecture. Retrieved from http://docs.oasis-open.org/
Loveman, G. (2003). Diamonds in the data mine. Harvard
soa-rm/v1.0/soa-rm.pdf
Business Review, 81(5), 109–113.
Maister, D. H., & Lovelock, C. H. (1982). Managing
Low, J. M. W., & Tang, L. C. (2006). Factor Substitu-
Facilitator Services. Sloan Management Review, 23(4),
tion and Complementarity in the Asia Airport Industry.
9–20.
Journal of Air Transport Management, 12, 261–266.
doi:10.1016/j.jairtraman.2006.07.003 Mäkinen, T., Mäntynen, J., & Vanhatalo, J. (2005). Lo-
gistiikka ja kuljetusjärjestelmät (Logistics and transport
Lu, G. (2005). The analysis of situation and question
systems (Tech Report 38.) The Tampere University of
about the third party logistics in our country. Journal of
Technology, Faculty for transport technologies.
Logistic Science Technology, 28(6), 50–51.
Malone, T. W., & Crowston, K. (1994). The interdisci-
Lubecke, O. B., & Lubecke, V. M. (2002). Wireless
plinary study of coordination. ACM Computing Surveys,
house calls: using communications technology for health
26(1), 87–119. doi:10.1145/174666.174668
care monitoring. IEEE Micro, 3(3), 43–48. doi:10.1109/
MMW.2002.1028361 Mani, A., & Nagarajan, A. (2002). Understanding Quality
of Service for Web Services. Retrieved from http://www.
Lui, T.-W., & Piccoli, G. (2007). Degrees of Agility:
ibm.com/developerworks/library/ws-quality.html
Implications for Information Systems Design and Firm
Strategy. In Desouza K.C. (Ed.) Agile Information Sys- Mannur, N., & Addagatla, J. (1993). Heuristic Algorithm
tems (pp.112-134), Amsterdam: Elsevier, Butterworth- for Solving Earliness-Tardiness Scheduling Problem with
Heinemann. Machine Vacations. Computers & Industrial Engineering,
25(1-4), 255–258. doi:10.1016/0360-8352(93)90269-4
Lurie, N., & Mason, C. (2007). Visual Representation:
Implications for Decision Making. Journal of Marketing, Marasco, A. (2008). Third-party Logistics – A Literature
71, 160–177. doi:10.1509/jmkg.71.1.160 Review. International Journal of Production Economics,
113(1), 127–147. doi:10.1016/j.ijpe.2007.05.017
Lysons, K., & Farrington, B. (2006). Purchasing and sup-
ply chain management. Pearson Education Limited. Marchand, D. (2000). Why information is the responsibil-
ity of every managers? In Marchand D. (Ed.) Competing
Mabert, V. A., & Venkataramanan, M. A. (1998). Special
with Information (pp. 3-17), Chichester, UK: John Wiley
research focus on supply chain linkages: Challenges for
and Sons, Ltd.
design and management in the 21st century. Decision
Sciences, 29(3), 537–552. doi:10.1111/j.1540-5915.1998. Marchand, D. A., Kettinger, W. J., & Rollins, J. D.
tb01353.x (2000). Information orientation: People, technology and
the bottom line. Sloan Management Review, (Summer):
Macbeth, D. K. (2002). Emergent strategy in managing
69–79.
cooperative supply chain change. International Journal of
401
Compilation of References
Mardia, K. V., Kent, J. T., & Bibby, J. M. (1979). Multi- conversation”, Interview Series, Mercer Management
variate Analysis. New York: Academic Press. Journal, 16. Retrieved from http://www.oliverwyman.
com/ow/pdf_files/MMJ16_Interview_Contentious_De-
Martínez, A., Cantú, M., Cedillo, G., & Arriaga, J. (2006)
bate.pdf
Medición del desempeño de proveedores de servicio y su
importancia en la cadena de suministro. XXVIII Con- McCord, A. (2003) Sourcing Information Technology
greso Internacional Calzatecnia, León Guanajuato. Services. In P. McClure (ed), EDUCAUSE Leadership
Strategies Series, Volume 7 – Managing Information
Martínez, E., & Escudey, M. (1998). Evaluación y de-
Resources, EDUCAUSE. New York: John Wiley and
cisión multicriterio. UNESCO-Editorial Universidad de
Sons.
Santiago, Chile.
McDonald, M., & Wilson, H. (1999). Improving market-
Martinez-Olvera, C. (2008). Methodology for realign-
ing effectiveness through IT. Cranfield Management
ment of supply-chain structural elements. Interna-
Research Series - working paper, (pp. 30-45).
tional Journal of Production Economics, 114, 714–722.
doi:10.1016/j.ijpe.2008.03.008 McDougall, G. H. G., & Snetsinger, D. W. (1990). The
Intangibility of Services: Measurement and Competitive
Marton, A., Piccinelli, G., & Turfin, C. (1999). Service
Perspectives. Journal of Services Marketing, 4(4), 27–40.
provision and composition in virtual business commu-
doi:10.1108/EUM0000000002523
nities. Paper presented at the 18th IEEE Symposium on
Reliable Distributed Systems. McGinnis, L. (2002). A brave new education. IIE Solu-
tions, 34(12), 27–31.
Matthing, J., Kristensson, P., Gustafsson, A., & Parasura-
man, A. (2006). Developing successful technology-based McGladrey, R. S. M. (2009). RSM. Retrieved June 28,
services: the issue of identifying and involving innovative 2009, from http://www.rsmmcgladrey.com/
users. Journal of Services Marketing, 20(5), 288–297.
McGovern, G. (2000). Managing information in the
doi:10.1108/08876040610679909
digital age: How the reader is king. Irish Marketing
Maximilien, M., & Toward, S. M. (2005). Web Services Review, 13(2), 55–61.
Interaction Styles. In Proceedings of IEEE Services
McGovern, G., & Moon, Y.,(2007, June 2-7). Companies
Computing Conference (SCC).
and the Customers Who Hate Them, Harvard Business
Mayer, K. J., Bowen, J. T., & Moulton, M. R. (2003). Review.
A proposed model of the descriptors of service pro-
McHugh, G., Fahy, J., & Butler, P. (1998). Accountant
cess. Journal of Services Marketing, 17(6), 621–639.
behaving badly: A marketing perspective. Irish Market-
doi:10.1108/08876040310495645
ing Review, 11(1), 19–26.
Mc Guire, G. A. (2006). Development of a supply chain
McLaughlin, S., Paton, R. A., & Macbeth, D. K.
management framework for health care goods provided
(2006). Managing change within IBM’s complex sup-
as humanitarian assistance in complex political emergen-
ply chain. Management Decision, 44(8), 1002–1019.
cies. Vienna, Austria: Vienna University of Economics
doi:10.1108/00251740610690586
and Business Administration.
Meredith, J. (1995, July 9-11). Airport Capacity Con-
McAfee, A. (2006). Mastering the Three Worlds of
straints in Asia Pacific. A paper presented at the confer-
Information Technology. Harvard Business Review,
ence on Air Transport in the Asia Pacific – Challenges,
84(11), 141–149.
Opportunities and Options, Singapore.
McClune, J. (2003) Contentious Debate? It Works at
Philips: A technology powerhouse masters the “strategic
402
Compilation of References
Merkuryeva, G., Merkuryev, Y., & Tolujev, J. (2000). Minoli, D. (2002). Hotspot networks: Wi-Fi for public
Computer simulation and Metamodelling of logistics access locations. New York: McGraw-Hill.
processes at a container terminal. Studies in Informatics
Mishra, R. K. (2006). Role of information technology
and Control, 9(1), 1–10.
in supply chain management. Retrieved April 1, 2009,
Meroño-Cerdan, A. L., Soto-Acosta, P., & Lopez- from www.indianmba.com/Faculty_Column/FC461/
Nicolas, C. (2008). How do collaborative technologies fc461.html.
affect innovation in SMEs? International Journal of
Mitchell, A. (2001). Radical Innovation. BT Technology
e-Collaboration, 4(4), 33–50.
Journal, 19(4), 60–64. doi:10.1023/A:1013730529933
Merriam-Webster Online Dictionary. (2009). Communi-
Mitchell, V. W. (1998). A role for consumer risk percep-
cation. Retrieved February 27, 2009, from http://www.
tions in grocery retailing. British Food Journal, 100(4),
merriam-webster.com/dictionary/communication
171–183. doi:10.1108/00070709810207856
Mettler, T., & Rohner, P. (2008). Supplier relationship
Mitchell, V. W. (1999). Consumer perceived risk: Concep-
management in healthcare practice: A case study, Paper
tualizations and models. European Journal of Marketing,
presented at the 6th CollECTeR Iberoamerica.
33(1/2), 163–195. doi:10.1108/03090569910249229
Mettler, T., & Rohner, P. (2009a). E-Procurement in
Mitchell, V. W., & Boustani, P. (1994). A preliminary
Hospital Pharmacies: An Exploratory Multi-Case Study
investigation into pre- and post-purchase risk perception
from Switzerland. Journal of Theoretical and Applied
and reduction. European Journal of Marketing, 28(1),
Electronic Commerce Research, 4(1), 23–38.
56–57. doi:10.1108/03090569410049181
Mettler, T., & Rohner, P. (2009b). Increasing the net-
Mitchell, V. W., & Greatorex, M. (1993). Risk percep-
workability of health service providers: The case of
tion and reduction in the purchase of consumer services.
Switzerland. Sprouts - Working Papers on Information
Service Industries Journal, 13(October), 179–200.
Systems, 9(1), 1-13.
Mitchell, V. W., & Prince, G. S. (1993). Retailing to expe-
Meuter, M. L., Ostorm, A. L., Roundtree, R. I., & Bitner,
rienced and inexperienced consumers: A perceived risk
M. J. (2000). Self-service technologies: Understanding
approach. International Journal of Retail & Distribution
customer satisfaction with technology-based service en-
Management, 12(5), 10–21.
counters. Journal of Marketing, 64(3), 50–64. doi:10.1509/
jmkg.64.3.50.18024 Mitra, K., Reiss, M., & Capella, L. (1999). An exami-
nation of perceived risk, information search and be-
Meyronin, B. (2004). ICT: the creation of value and
havioral intentions in search, experience and credence
differentiation in services. Managing Service Quality,
services. Journal of Services Marketing, 13(3), 208–228.
14(2/3), 216–225. doi:10.1108/09604520410528635
doi:10.1108/08876049910273763
Milenkovic, A., Otto, C., & Jovanov, E. (2006). Wireless
Miyazaki, M. (1990). Atarasii sisutemuzu apuroochi to
sensor networks for personal health monitoring: Issues and
taiwagata OR: taiwagata OR no houhouronteki haikei
an implementation. Computer Communications, 29(13-
wo nagamete [New Systems Approach and Interactive
14), 2521–2533. doi:10.1016/j.comcom.2006.02.011
OR: Looking at methodological background of interac-
Miller, A. (2004). Order Picking for the 21st Century Voice tive OR]. Operations research as a management science
vs. Scanning Technology A White Paper, Principal Tomp- research, 35(8), 454-456.
kins Associates, Retrieved from http://www.baxtek.com/
Moe, R. L. (1988). Networking and Ship-To-Shore
products/vocollect/Voice_v_Scan_White_Paper.pdf
Ship-To-Ship Communication, CH2585-8/88/00005-3,
Min, L., & Zhiqi, F. (2002). The logistics model selection. IEEE. http://ieeexplore.ieee.org/iel5/738/906/00023558.
Outlook Weekly, 32, 39–40. pdf?arnumber=23558
403
Compilation of References
Moeeni, F. (2008). A passive RFID location sensing. Murray, K. B., & Schlacter, J. L. (1990). The impact
In Proceedings of the 12th World Multi-Conference on of services versus goods on consumers’ assessment of
Systemics, Cybernetics and Informatics (pp. 84-89). perceived risk. Journal of the Academy of Marketing
Science, 18(1), 51–65. doi:10.1007/BF02729762
Moeller, R. A. (2001) Distributed data warehousing using
Web technology, how to build a more cost-effective and Murty, K. G., Liu, J., Wan, Y., & Linn, R. (2005). A
flexible warehouse, New York: Amacom. decision support system for operations in a container
terminal. Decision Support Systems, 39(3), 309–332.
Moeller, R. R. (2008) Sarbanes-Oxley Internal Controls,
doi:10.1016/j.dss.2003.11.002
Effective Auditing with AS5, CobitT, and ITIL. Hoboken,
NJ: J.Wiley & Sons. Myburgh, S. (2000). The convergence of information
technology and information management. Information
Monczka, R., Trent, R., & Handfield, R. (2005). Pur-
Management Journal, 34(2), 4–16.
chasing & supply chain management (3rd ed.). Mason,
OH: Thomson. Myers, M. D. (1997). Qualitative research in in-
formation systems. MIS Quarterly, 21(1), 241–242.
Morgenstern, O. (1955). Note on the Formulation of the
doi:10.2307/249422
Theory of Logistics. Naval Research Logistics Quarterly
Review, 2, 129–136. doi:10.1002/nav.3800020303 Nadeem, M. (2007). Emergence of Customer-Centric
Branding: From Boardroom Leadership to Self-Broad-
Morimoto, N., & Sawatani, Y. (2005, November). Saabisu
casting. Journal of American Academy of Business,
saiensu no kanousei [The Potential of Service Science].
12(1), 44–49.
Diamond Harvard Business Review, 109-124.
Nam, C. S., Johnson, S., Li, Y., & Seong, Y. (2009).
Muessigmann, N., & Albani, A. (2006). Supplier network
Evaluation of human-agent user interfaces in multi-agent
management: evaluating and rating of strategic supply
systems. International Journal of Industrial Ergonomics,
networks. Paper presented at the 2006 ACM symposium
39(1), 192–201. doi:10.1016/j.ergon.2008.08.008
on Applied computing.
Naxtor Technologies. (2008). Naxtor Technologies
Mukohara, T., & Sekiguchi, Y. (2002). The DSS archi-
discuss positive effects of IT on warehouse operations.
tecture based on problems specification and model/solver
Retrievedfrom http://www.ferret.com.au/c/Naxtor-Tech-
independence. In E. Kozan, & A. Ohuch (Ed.), Opera-
nologies/Naxtor-Technologies-discuss-positive-effects-
tions Research/Management Science at work: Applying
of-IT-on-warehouse-operations-n817737/tags
Theory in the Area Pacific Region (pp.281-298). The
Netherlands: Kluwer Academic Publishers. Nelly, A., Gregory, M., & Platts, K. (1995). Performance
Measurement System Design. International Journal of
Mukohara, T., Sekiguchi, Y., & Bao, J. (2005). Jittai-
Operations & Production Management, 16(4), 19–34.
kanren gainen no kakutyou niyoru sukejyuuring mondai
kijyutu no tokutyou to ouyou [Scheduling Problems Nevalainen, E. (2006). Kuljetusriskien hallinta (Manage-
Specification by Extending Entity-Relationship Concept: ment of transportation risks). Pohjola Insurance Ltd.
Characteristics and Applications]. Transactions of the Retrieved January 7, 2009 from http://www.finva.fi/
Operations Research Society of Japan, 48, 66–84. eoppiminen/materiaalit/Materiaali2006/Nevalainen_lu-
ento_2006.pdf
Murphy, F. H. (2005). ASP, The Art and Science of Prac-
tice; Elements of a Theory of the Practice of Operations New South Wales Government. (2009). Department
Research: A Framework. Interfaces, 35(2), 154–163. of State and Regional Development. Retrieved from
doi:10.1287/inte.1050.0126 http://www.business.nsw.gov.au/innovation/sectors/
logistics.htm
404
Compilation of References
Ng, H. S., Sim, M. L., & Tan, C. M. (2006). Security issues Nonaka, I., & Takeuchi, H. (1995). The knowledge-
of wireless sensor networks in healthcare applications. creating company: How Japanese companies create the
BT Technology Journal, 24(2), 138–144. doi:10.1007/ dynamics of innovation. New York: Oxford University
s10550-006-0051-8 Press.
Ng, J. W. P., et al. (2004). Ubiquitous monitoring environ- Normann, R. (1991). Service Management: Strategy and
ment for wearable and implantable sensors (UbiMon). Leadership in Service Business. Second Edition, pp.
In Proceedings of the 6th International Conference on 16-17. New York: John Wiley & Sons Ltd.
Ubiquitous Computing (UBICOMP ‘04), Nottingham,
Nucciarelli, A., & Gastaldi, M. (2008). Information
UK.
technology and collaboration tools within the e-supply
Ngai, E. W. T., & Gunasekaran, A. (2007). A review chain management of the aviation industry. Technology
for mobile commerce research and applications. Analysis and Strategic Management, 20(2), 169–184.
Decision Support Systems, 43, 3–15. doi:10.1016/j. doi:10.1080/09537320801931309
dss.2005.05.003
Nyman, L. R. (1992). Making manufacturing cells work.
Ngai, E. W. T., Cheng, T. C. E., Au, S., & Lai, K. (2007). Drabber, MI: Society of Manufacturing Engineers.
Mobile commerce integrated with RFID technology in a
Nysveen, H., Pedersen, P., & Thorbjørnsen, H. (2005).
container depot. Decision Support Systems, 43(1), 62–76.
Explaining intention to use mobile chat services: moder-
doi:10.1016/j.dss.2005.05.006
ating effects of gender. Journal of Consumer Marketing,
Niederman, F., Mathieu, R. G., Morley, R., & Kwon, 22(5), 247–257. doi:10.1108/07363760510611671
I.-W. (2007). Examining RFID applications in supply
O’Brien, T. V., Schoenbachler, D. D., & Gordon,
chain management. Communications of the ACM, 50,
G. L. (1995). Marketing information systems for
92–101. doi:10.1145/1272516.1272520
consumer products companies: A management over-
Nigam, A., & Caswell, N. (2003). Business artifacts: view. Journal of Consumer Marketing, 12(5), 16–36.
An approach to operational specification. IBM Systems doi:10.1108/07363769510147777
Journal, 42(3), 428–445.
O’Conner, W. E. (1995). An Introduction to Airline
Nijkamp, P., & Yim, H. (2001). Critical Success Factors for Economics, 5th Edition. Westport CT: Praeger.
Offshore Airports: A Comparative Evaluation. Journal
O’Connor, M., & Brady, M. (2006, September). The
of Air Transport Management, 7, 181–188. doi:10.1016/
Hotel Sector In Ireland–Technology-Based Marketing
S0969-6997(01)00003-5
Enterprises? Irish Academy of Management Conference,
NimBUS. (2007). NimBUS for SLA Monitoring and University of Cork, Ireland.
Reporting. Retrieved from http://www.nimbuspartners.
O’Hara, B., & Petrick, A. (1999). The IEEE 802.11
com/content.php?name=home.html
Handbook: A Designer’s Companion. New York: IEEE
Nishimura, E., Imai, A., & Papadimitriou, S. (2001). Press.
Berth allocation in the public berth system by genetic
OECD. (2007). Moving up the value chain: Staying
algorithms. European Journal of Operational Research,
competitive in the global economy. A synthesis report
131, 282–292. doi:10.1016/S0377-2217(00)00128-4
on global value chains. Pariso.
Nolan, R. (1973). Computer data bases: The future is
Ohashi, H., Kim, T. S., Oum, T. H., & Yu, C. (2005).
now. Harvard Business Review, 51(5), 98–114.
Choice of Air Cargo Transshipment Airport – An Ap-
Nolan, R. (1998, July-August 3-14). Connectivity and plication to Air Cargo Traffic to/ from Northeast Asia.
control in the year 2000 and beyond. Harvard Business Journal of Air Transport Management, 11, 149–159.
Review. doi:10.1016/j.jairtraman.2004.08.004
405
Compilation of References
Ojala, M., & Hallikas, J. (2006). Investment decision- Pantazis, N. A., Vergados, D. J., Vergados, D. D., &
making in supplier networks: management of risk. Douligeris, C. (2009). Energy efficiency in wireless
International Journal of Production Economics, 104, sensor networks using sleep mode TDMA schedul-
201–213. doi:10.1016/j.ijpe.2005.03.006 ing. Ad Hoc Networks, 7(2), 322–343. doi:10.1016/j.
adhoc.2008.03.006
Olowolayemo, S. O., Hatch, U., & Zidack, W. (1992). Po-
tential U.S. retail grocery markets for farm-raised catfish. Parasuraman, A., & Zeithaml., V. A. (2004). Service
Journal of Applied Aquaculture, 1, 51–71. doi:10.1300/ Quality. Marketing Science Institute.
J028v01n04_05
Parasuraman, A., Berry, L. L., & Zeithaml, V. A. (1991).
Op de Coul, J. (2005). IT Services Procurement based on Understanding customer expetations of service. Sloan
ISPL. The Netherlands:van Haren Publishers. Management Review. Cambridge, MA: Harvard Busi-
ness Press.
Osmundson, J. S., Gottfried, R., Chee, Y. K., Lau, H. B.,
Lim, W. L., Poh, S. W. P., & Tan, C. T. (2004). Process Parasuraman, A., Zeithaml, V. A., & Berry, L. L. (1985).
modeling: A systems engineering tool for analyzing A Conceptual Model of Service Quality and Its Implica-
complex systems. Systems Engineering, 7(4), 320–337. tions for Future Research. Journal of Marketing, 49(Fall),
doi:10.1002/sys.20012 41–50. doi:10.2307/1251430
Österle, H., Fleisch, E., & Alt, R. (2000). Business Parasuraman, A., Zeithaml, V. A., & Berry, L. L. (1988).
networking shaping collaboration between enterprises. SERVQUAL: A Multiple Item Scale for Measuring
Berlin: Springer. Consumer Perceptions of Service Quality. Journal of
Retailing, 64(1), 12–40.
Ostermayer, G., Pohl, A., Hausleitner, C., Reindl, L.,
& Seifert, F. (1996). CDMA for wireless SAW sensor Pare, D. J. (2003). Does this site deliver? B2B e-commerce
applications. In Proc. IEEE Int.Spread-Spectrum Tech. services for developing countries. The Information Soci-
Applicat. Symp., (pp. 795–799). ety, 19, 123–134. doi:10.1080/01972240309457
Oum, T. H., Yu, C., & Fu, X. (2003). A Comparative Parente, S. T. (2000). Beyond the hype: A taxonomy of
Analysis of Productivity Performance of the World’s e-health business models. Health Affairs, 19(6), 89–102.
Major Airports: A Summary Report of the ATRS Global doi:10.1377/hlthaff.19.6.89
Airport Benchmarking Research Report 2002. Journal
Park, J. Y., & Park, S. J. (1999). IBPM: An integrated
of Air Transport Management, 9, 285–297. doi:10.1016/
systems model for business process reengineering. Sys-
S0969-6997(03)00037-1
tems Engineering, 1(3), 159–175. doi:10.1002/(SICI)1520-
Palmer, J. W., & Markus, L. M. (2000). The performance 6858(1998)1:3<159::AID-SYS2>3.0.CO;2-H
impacts of quick response and strategic alignment in
Park, W. C., Mothersbaugh, D. L., & Feick, L. (1994).
specialty retailing. Information Systems Research, 11(3),
Consumer knowledge assessment. The Journal of Con-
241–259. doi:10.1287/isre.11.3.241.12203
sumer Research, 21(1), 71–82. doi:10.1086/209383
Panayides, P. M., & So, M. (2005). Logistics service
Park, Y. (2003). An Analysis for the Competitive
provider-client relationships. Transportation Research
Strength of Asian Major Airports. Journal of Air
Part E, Logistics and Transportation Review, 41(3),
Transport Management, 9, 353–360. doi:10.1016/S0969-
179–200. doi:10.1016/j.tre.2004.05.001
6997(03)00041-3
Pantazis, N. A., & Vergados, D. D. (2007). A survey on
Pärkkä, J., et al. (2002). A wireless wellness monitor
power control issues in wireless sensor networks. Com-
for personal weight management. In Proceedings of
munications Surveys & Tutorials, IEEE, 9(4), 86–107.
doi:10.1109/COMST.2007.4444752
406
Compilation of References
IEEE EMBS International Conference on Information Piasecki, D. (2001). Order Picking: Methods and Equip-
Technology Applications on, (pp. 83-88). ment for Piece Pick, Case Pick, and Pallet Pick Opera-
tions, Inventory Operations Consulting L.L.C. Retrieved
Parola, F., & Sciomachen, A. (2005). Intermodal container
from http://www.logprojects.lt/uploads/Order_pick-
flows in a port system network: Analysis of possible
ing_methods.pdf
growths via simulation models. International Journal
of Production Economics, 97, 75–88. doi:10.1016/j. Pibernik, R., & Sucky, E. (2007). An approach to
ijpe.2004.06.051 inter-domain master planning in supply chain. Interna-
tional Journal of Production Economics, 108, 200–212.
Parvatiyar, A., & Sheth, N., J. (2001). Customer rela-
doi:10.1016/j.ijpe.2006.12.010
tionship management: Emerging practice, process, and
discipline. Journal of Economic and Social Research, Piercy, N., (1981) Marketing Information bridging the
3(2), 1–34. quicksand between technology and decision-making,
The Quarterly Review of Marketing, Fall,1-15.
Paton, R. A., & Mclaughlin, S. (2008). Services in-
novation: Knowledge transfer and the supply chain. Pohl, A. (2000). Review of wireless SAW sensors. IEEE
European Management Journal, 26, 77–83. doi:10.1016/j. Trans. UFFC, 47(2), 317–332.
emj.2008.01.004
Pohto, P., Sihvola, I., & Kallio, J. (2005). Logistiikan
Payne, A. (2006) Handbook of CRM, Oxford, UK: sähköisten tieto- ja viestintäteknologioiden hyödyn-
Butterworth-Heinemann täminen – Kokemuksia Euroopasta (Utilization of
electronic information and communication technologies
Peng, H. (2007). Research of customer services of third
in logistics – Experiences from Europe). Technology
party logistics business. Beijing, China: Beijing Jiaotong
review 173/2005. Tekes.
University.
Poon, S., & Swatman, P. M. C. (1997). Small business
Perez, C. (2002). Technological revolutions and finan-
use of the Internet: Findings from Australian case stud-
cial capital: The dynamics of bubbles and golden ages.
ies. International Marketing Review, 14(5), 385–402.
Northampton, MA: Edward Elgar.
doi:10.1108/02651339710184343
Perkins, C. E. (2001). Ad hoc networking, Reading, MA:
Porter, M. E. (1985). Competitive Advantage. New York:
Addison-Wesley.
Free Press.
Perrig, A., Szewczyk, R., Tygar, J. D., Wen, V., &
Porter, M. E. (1987). Wettbewerbsstrategie – Methoden
Culler, D. E. (2002). Spins: security protocols for
zur Analyse von Branchen und Konkurrenten (in English:
sensor networks. Wireless Networks, 8(5), 521–534.
Competitive Strategy – Methods to Analyze Industries
doi:10.1023/A:1016598314198
and Competitors), 4th Ed., Frankfurt/New York
Peter, J. P., & Ryan, M. J. (1976). An investigation of per-
Porter, M. E., & Olmsted-Teisberg, E. (2004). Redefining
ceived risk at the brand level. JMR, Journal of Marketing
competition in health care. Harvard Business Review,
Research, 13(May), 184–188. doi:10.2307/3150856
82(6), 64–76.
Petering, M. E. H. (2009). Effect of block width and
Post, J. E., Preston, L. E., & Sachs, S. (2002). Redefining
storage yard layout on marine container terminal per-
the corporation: Stakeholder mamangement and orga-
formance. Transportation Research Part E, Logistics
nizational wealth. Stanford, CA: Stanford University
and Transportation Review, 45, 591–610. doi:10.1016/j.
Press.
tre.2008.11.004
407
Compilation of References
Prahalad, C. K., & Ramaswamy, V. (2003). The new Quilty, S. (2003). Achieving Recognition as a World
frontier of experience innovation, MIT. Sloan Manage- Class Airport through Education and Training. Journal
ment Review, 44(4), 12–18. of Air Transportation, 8, 3–14.
Prahalad, C. K., & Ramaswamy, V. (2004). Co-creation Radjou, N. (2003). U.S. manufacturers’ supply chain
experiences: The next practice in value creation. Jour- mandate. World Trade, 16(12), 42–46.
nal of Interactive Marketing, 18(3), 5–14. doi:10.1002/
Raguraman, K. (1997). International Air Cargo Hubbing:
dir.20015
The Case of Singapore. Asia Pacific Viewpoint, 38(1),
prEN 50067: (1997, July) Specification of the radio data 55–74. doi:10.1111/1467-8373.00028
system (RDS).
Raines, R. R. (1996). Getting the Message Through: A
Prestwood, D. C. L., & Schumann, P. A. Jr. (1997, July Branch History of the U.S. Army Signal Corps, CMH
15). Innovate! Applying Innovation to the Business of Pub 30-17. (pp. 224). Washington, DC: Center of Military
Peru A Summary of the Talk Given at the III Summit History, United States Army.
on Competitiveness in Lima, Peru.
Rainey, H. G., Backoff, R. W., & Levine, C. H.
Prestwood, D. C. L., & Schumann, P. A., Jr. (1994). In- (1976). Comparing public and private organiza-
novate! New York:McGraw-Hill. tions. Public Administration Review, 36(2), 233–244.
doi:10.2307/975145
Pruitt, D. G. (1971). Conclusions: towards an under-
standing of choice shifts in group discussion. Journal Ramaswamy, V. (2008). Co-creating value through cus-
of Personality and Social Psychology, 20(3), 495–510. tomers’ experiences: The Nike case. Strategy and Leader-
doi:10.1037/h0031923 ship, 36(5), 9–14. doi:10.1108/10878570810902068
Pulli, H., Kajander, S., & Tapaninen, U. (2007). Satamasi- Ramirez, R. (1999). Value co-production: Intel-
donnaisten yritysten tietotarpeet. (Information needs of lectual origins and implications for practice and re-
port related companies). Research report of University of search. Strategic Management Journal, 20(1), 49–65.
Turku, Centre of Maritime Studies, B:149, Turku doi:10.1002/(SICI)1097-0266(199901)20:1<49::AID-
SMJ20>3.0.CO;2-2
Punakivi, M., Aminoff, A., Auramo, J., Pajunen-
Muhonen, H., Lehtinen, J., & Yrjölä, H. (2001). Karkelo Ranchhod, A. (2004). The changing nature of cyber-mar-
– Kartoitus elektronisen liiketoiminnan logistiikasta keting strategies. Business Process Management Journal,
(Survey of the logistics of electronic business). Retrieved 10(3), 262–276. doi:10.1108/14637150410539678
February 3, 2009, from http://www.tuta.hut.fi/logistics/
Rao, A., Papadimitriou, C., Shenker, S., & Stoica, I.
publications/Karkelo.pdf
(2003). Geographic routing without location informa-
Quagrainie, K. (2006). IQF catfish retail pack: A study of tion. In Proceedings of the 9th Annual International
consumers’ willingness to pay. International Food and Conference on Mobile Computing and Networking on,
Agribusiness Management Review, 9(2), 16–27. (pp.96-108).
Quagrainie, K. K., & Engle, C. R. (2002a). A latent class Ratliff, H. D., & Nulty, W. G. (1997). Logistics composite
model for analyzing preferences for catfish. Aquaculture modelling, In The planning and scheduling of production
Economics and Management, 6(1), 23–34. systems–Edited by Artiba, A. & Elmaghraby, S.E. Chap-
man & Hall (eds.), Methodologies and applications.
Quagrainie, K. K., & Engle, C. R. (2002b). Analysis of
catfish pricing and market dynamics: The role of imported Raulerson, R., & Trotter, W. (1973). Demand for farm-
catfish. Journal of the World Aquaculture Society, 334, raised channel catfish in supermarkets: An analysis of
389–397. doi:10.1111/j.1749-7345.2002.tb00018.x
408
Compilation of References
selected market. (Marketing Research Report No. 993). Ross, I. (1975). Perceived risk and consumer behavior: A
Washington DC: SDA Economic Research Service. critical review, Conference of the American Marketing
Association, 19-23.
Rauniyar P. G., Hermann, R. O., & Hanson, G. D. (1997).
Identifying frequent purchasers of seafood at home and Rouse, W. B. (2004). Embracing the enterprise. Industrial
restaurants consumption. The Southern Business and Engineer, 36(3), 31–35.
Economic Journal, 114-129.
Rouse, W. B. (2005). Enterprises as systems: Essential
Reichheld, F. F., & Schefter, P. (2000). E-loyalty. Harvard challenges and approaches to transformation. Systems
Business Review, 78(4), 105–113. Engineering, 8(2), 138–150. doi:10.1002/sys.20029
Reinikainen, P., Mäntynen, J., & Rantala, J. (1997). Rubery, J., Earnshaw, J., Marchington, M., Cooke, F. L.,
Logistiikan perusteet (The basics of logistics). Tampere, & Vincent, S. (2002). Changing organizational forms and
Finland: Tampere University of Technology, The Faculty the employment relationship. Journal of Management
for Transport Technologies. RE:view, 27. Studies, 39(5), 645–672. doi:10.1111/1467-6486.00306
Riemer, K., & Klein, S. (2002). Supplier Relationship Rüegg-Stürm, J. (2005). The new St. Gallen management
Management. HMD - Praxis. Wirtschaftsinformatik, model: Basic categories of an approach to integrated
228, 5–22. management. Basingstoke, NY: Palgrave Macmillan.
Ritter, T., & Gemünden, H. G. (2003). Interorganizational Ruizmercader, J., Meronocerdan, A., & Sabatersanchez,
relationships and networks: An overview. Journal of R. (2006). Information technology and learning: Their
Business Research, 56, 691–697. doi:10.1016/S0148- relationship and impact on organizational performance
2963(01)00254-5 in small businesses. International Journal of Informa-
tion Management, 26(1), 16–29. doi:10.1016/j.ijinfo-
Robinson, P. J., Faris, C. W., & Wind, Y. (1967). Industrial
mgt.2005.10.003
Buying and Creative Marketing, Boston
Ruiz-Olalla, C. (2001). Gestión de la calidad del servicio,
Robinson, R. (1998). Asian hub/feeder nets: the dynamics
[en línea] 5campus.com, Control de Gestión. Retrieved
of restructuring. Maritime Policy & Management, 25(1),
May 24, 2009, from http://www.5campus.com/leccion/
21–40. doi:10.1080/03088839800000043
calidadserv
Robison, L. (2007). The CIO Dilemma: Build, Buy or
Rytsy, A. (2007). RFID veti väkeä Logistics 2007 -tapah-
Borrow. Burton Group Report.
tumassa (RFID raised interest in Logistics 2007 event).
Rodero, J. A., & Piattini, M. (2000). Auditing Data Ware- Logistiikka – The Magazine of Finnish Association of
houses. In Piattini M.(Ed.) Auditing Information Systems Purchasing and Logistics, 5, 38–39.
(pp.109-148), Hershey, PA: Idea Group Publishing.
Saaty, T. (1980). The Analytic Hierarchy Process. New
Romer, D. (2001). Advanced Macroeconomics. 2nd Edi- York: McGraw Hill International.
tion, New York: McGraw-Hill.
Sabogal, J., & Tholke, J. (2004). Compliant manufac-
Römer, K., & Mattern, F. (2004). The design space of turing with SAP in the pharmaceutical industry. Die
wireless sensor networks. IEEE Wireless Communica- Pharmazeutische Industrie, 66(11), 1405–1412.
tions, 11(6), 54–61. doi:10.1109/MWC.2004.1368897
Sadler, I. (2007). Logistics and Supply Chain Integration,
Roselius, T. (1971). Consumer rankings of risk reduction Los Angeles: Sage Publications.
methods. Journal of Marketing, 35(January), 56–61.
Salmela, E., Nieminen, L., & Lukka, A. (2006). Pros-
doi:10.2307/1250565
essien kehitys ja ICT:n hyödyntäminen hankintatoimin-
409
Compilation of References
nassa, logistiikassa ja toimitus- ja kysyntäketjun hallin- Schoeneman, J. L., & Sorokowski, D. (1998). Authenti-
nassa (Development of processes and utilization of ICT cated tracking and monitoring system (ATMS) tracking
in purchasing, logistics and supply chain management.). shipments from an Australian uranium mine. In Proceed-
Retrieved February 17, 2009, from http://partnet.vtt.fi/ ings of the 31st Annual 1997 International Carnahan
serviisi/tiedostot/serviisi_loppuraportti.pdf Conference on Security Technology on, (pp. 231-240).
Salmela, H., & Jahnukainen, M. (2003). IT enabled global Scholl, G. (2003). SAW-based radio sensor systems for
customer service: findings and conclusions from six case short-range applications. IEEE Microwave Magazine,
studies, In Reponen, T, (ed.), Information Technology- 4(4), 68–76. doi:10.1109/MMW.2003.1266068
Enabled Global Customer Service. Hershey, PA:Idea
Scholtz, J. (2002). Evaluation methods for human-
Group Publishing.
system performance of intelligent systems. InMessina,
Salvador, F., Forza, C., & Claes, B. (2007). Effectiveness E. R., & Meystel, A. M. (Eds.), Proceedings of the 2002
of the Product Configuration Task: Theory Formalization Performance Metrics for Intelligent Systems (PerMIS)
and Test, POMS 18th Annual Conference, Dallas, TX. Workshop. Retrieved June 28, 2009, from http://www.
isd.mel.nist.gov/research_areas/research_engineering/
Sambamurthy, V., Bharadwaj, A., & Grover, V. (2003).
Performance_Metrics/PerMIS_2002_Proceedings/
Shaping agility through digital options: reconceptualiz-
Scholtz.pdf
ing the role of information technology in contemporary
firms. MIS Quarterly, 27(2), 237–263. Schultze, U., & Orlikowski, W. J. (2004). A Practice
Perspective on Technology-Mediated Network Relations:
SAP. (2003). What is supplier relationship management?
The Use of Internet-Based Self-Serve Technologies. In-
Retrieved February 27, 2009, from http://searchsap.tech-
formation Systems Research, 15(1), 87–106. doi:10.1287/
target.com/sDefinition/0,sid21_gci871756,00.html
isre.1030.0016
Sarpola, S. J. (2007). Information systems in buyer-
Schweidel, D. A., Fader, P. S., & Bradlow, E. T. (2008).
supplier collaboration. Helsinki, Finland: Helsinki School
Understanding Service Retention Within and Across
of Economics.
Cohorts Using Limited Information. Journal of Market-
Satty, T. (2000). Fundamentals Of Decision Making and ing, 72(1), 82–94. doi:10.1509/jmkg.72.1.82
Priority Theory. Pittsburgh, PA: RWS Publications.
Scott, W. R. (2002). Organizations: Rational, natural,
Schelp, J., & Winter, R. (2007) Integration Management and open systems (5 ed.). Upper Saddle River, NJ:
for Heterogeneous Information Systems. In Desouza Prentice Hall.
K. C. (Ed.) Agile Information Systems (pp.134-150),
Seth, N., Deshmukh, G., & Vrat, P. (2005). Service
Amsterdam: Elsevier, Butterworth-Heinemann.
quality models: a review. International Journal of
Schmid, B. F., & Lindenmann, M. A. (1998). Elements Quality & Reliability Management, 22(9), 913–949.
of a reference model for electronic markets. Paper pre- doi:10.1108/02656710510625211
sented at the Thirty-First Annual Hawaii International
Seth, N., Deshmukh, G., & Vrat, P. (2006a). A framework
Conference on System Sciences.
for measurement of quality of service in supply chains.
Schmitt, A. (2006). 4PL-providing als strategische Option Supply Chain Management: An International Journal,
für Kontraktlogistikdienstleister – Eine konzeptionell- 11(1), 82–94. doi:10.1108/13598540610642501
empirische Betrachtung (in English: 4PL-provision as
Seth, N., Deshmukh, G., & Vrat, P. (2006b). SSQSC: a
Strategic Option for Contract Logistics Providers – A
tool to mesure supplier service quality in supply chain.
Conceptual-empirical View).
Production Planning and Control, 17(5), 448–463.
doi:10.1080/09537280600741764
410
Compilation of References
Settles, S. F. (2003). Information systems engineering Smirnov, A., & Chandra, C. (2001). Information Technolo-
emphasis. In Proceedings of 2003 Industrial Engineering gies for Supply Chain Management, (pp. 437-460)
Research Conference, Portland, OR.
Smith, H., & Fingar, P. (2002). Business process man-
Shabayek, A. A., & Yeung, W. W. (2002). A simulation agement: The third wave. Tampa, FL: Meghan-Kiffer
model for the Kwai Chung container terminals in Hong Press.
Kong. European Journal of Operational Research, 140,
Smith, N. (1990). The case study: A useful research
1–11. doi:10.1016/S0377-2217(01)00216-8
method for information management. Journal of Informa-
Shabtay, D. (2008). Due Date Assignments and Schedul- tion Technology, 5(3), 123–13. doi:10.1057/jit.1990.30
ing A Single Machine with A General Earliness/Tardiness
Sohraby, K., Minoli, D., & Znati, T. (2007). Wireless
Cost Function. Computers & Operations Research, 35(5),
sensor networks: Technology, protocols, and application.
1539–1545. doi:10.1016/j.cor.2006.08.017
New York: John Wiley & Sons, Inc.
Shah, D., Rust, R., Parasumam, A., Stalin, R.,
Sousa, G. W. L., Van Aken, E. M., & Groesbeck, R. L.
& Day, G. (2006). The path to customer centric-
(2002). Applying an enterprise engineering approach to
ity. Journal of Service Research, 9(2), 113–124.
engineering work: A focus on business process modeling.
doi:10.1177/1094670506294666
Engineering Management Journal, 14(3), 15–24.
Shih, E., et al. (2001). Physical layer driven protocol and
Spekman, R. E., Kamauff, J. W., & Myhr, N. (1998). An
algorithm design for energy-efficient wireless sensor
empirical investigation into supply chain management:
networks. In MobiCom ‘01: Proceedings of the 7th an-
a perspective on partnership. International Journal of
nual international conference on Mobile computing and
Physical Distribution & Logistics Management, 28(8),
networking, (pp. 272-287). New York: ACM.
630–650. doi:10.1108/09600039810247542
Siltala, T. (2007). RFID ei vielä tartu (RFID does not
Spekman, R., & Sweeney, P. (2006). RFID: From concept
spread yet). Retrieved December 20, 2009, from http://
to implementation. International Journal of Physical
www.tietoviikko.fi/taustat/kaikki_ jutut/article136836.
Distribution and Logistics Management, 36(10), 736–754.
ece
doi:10.1108/09600030610714571
Singh, J. (1996). The importance of information flow
Sprott, D. (2006). Service Architecture and Engineering.
within the supply chain. Logistics Information Manage-
CBDI Journal. July/August.
ment, 9(4), 28–30. doi:10.1108/09576059610123132
Srivastava, L. (2005, July). RFID and the internet of things.
Singleton, T. W. (2009). What Every IT Auditor Should
Presented at ICT Trends and Challenges in the Global Era.
Know About IT audits and data. ISACA Journal, 2,
International Telecommunication Union, Twist, D. C.,
12–13.
(2005). The impact of radio frequency identification on
Sisodia, R. S. (1992). Marketing information and decision supply chain facilities. Journal of Facilities Management,
support systems for services. Journal of Services Market- 3(3), 226–236. doi:10.1108/14725960510808491
ing, 6(1), 51–64. doi:10.1108/08876049210035773
Statistics Finland. (2008). Use of information technology
Slack, N., Chambers, S., & Johnston, R. (2001). Operation in enterprises 2008. Statistics Finland, Helsinki.
Management. Essex, UK: Pearson Education Limited.
Steenken, D., Voss, S., & Stahlbock, R. (2004). Con-
Slovic, P., & Lichtenstein, S. (1968). Relative importance tainer terminal operation and operations research - a
of probabilities and payoff in risk taking. Journal of classification and literature review. OR-Spektrum, 26,
Experimental Psychology Monograph, 78(November), 3–49. doi:10.1007/s00291-003-0157-z
1–18. doi:10.1037/h0026468
411
Compilation of References
Stelzer, A. (2004). Identification of SAW ID-Tags Using Suri, R. (1985). Quantitative techniques for robotic sys-
an FSCW Interrogation Unit and Model-Based Evalua- tems analysis. In Handbook of Industrial Robotics, S.Y.
tion. IEEE Trans. UFFC, 51(11), 1412–142. Nof (Ed.), Chapter 31. New York: Wiley.
Stelzer, A., Schuster, S., & Scheiblhofer, S. (2004). Sussman, J. M. (2005). An Introduction to Intelligent
Readout Unit for Wireless SAW Sensors and ID-Tags, Transportation Systems, SPRING 1.212, Lectures 2, 3. Re-
in 2nd International Symposium on Acoustic Wave De- trieved from ocw.mit.edu/NR/rdonlyres/Civil-and-Envi-
vices for Future Mobile Communications (pp. 37–44), ronmental-Engineering/1-212JSpring-2005/5B253ABF-
Chiba, Japan. EC98-4E53-BA43 4F78500628EA/0/lec3.pdf
Stock, J. R., & Zinszer, P. H. (1987). The Industrial Swatman, P. M. C., & Swatman, P. A. (1991, February).
Purchase Decision for Professional Services. Journal Electronic data interchange: organizational opportunity,
of Business Research, 15(1), 1–16. doi:10.1016/0148- not technical problem. In Proceedings of the Conference
2963(87)90014-2 of the DBIS ′91 – 2nd Australian Conference on Infor-
mation Systems and Database (pp. 290-307). University
Straubhaar T. (2008). Drei Vorteile der Krise, Logistik
of New South, Wales, Sydney. Tompkins Associates
auf den Punkt, Heft 6.
Monograph Series, (n.d.). Warehouse Management Sys-
Stuart, I., McCutcheon, D., Handfield, R., McLachlin, tems Technologies, Transforming Customer Satisfaction
R., & Samson, D. (2002). Effective case research in Through Better Inventory Management. Retrieved from
operations management: a process perspective. Journal http://www.idii.com/wp/tompkins_wms.pdf
of Operations Management, 20(5), 419–433. doi:10.1016/
Swisslog. (2008). Pharmacy automation system. Re-
S0272-6963(02)00022-0
trieved February 27, 2009, from http://www.swisslog.
Studman, C. J. (2001). Computers and electronics in com/index/hcs-index/hcs-pharmacy/hcs-pharmacy-
postharvest technology – A review. Computers and components.htm
Electronics in Agriculture, 30(1-3), 109–124. doi:10.1016/
Sydow, J. (1999). Management von Netzwerkorganisa-
S0168-1699(00)00160-5
tionen – Zum Stand der Forschung (in English: Manage-
Su, W., et al. (2004). Communication Protocols for Sen- ment of Network Organisations – State of the Art). In:
sor Networks. In Raghavendra, C.S., Sivalingam, K., & Sydow, J. (Ed.): Management von Netzwerkorganisa-
Znati, T. (Eds.). Wireless Sensor Networks, New York: tionen, Wiesbaden, Germany (pp. 279-314).
Kluwer Academic.
Tait, F. (1999). Enterprise process engineering: A template
Sundbo, J., & Gallouj, F. (2000). Innovation as a loosely tailored for higher education. CAUSE/EFFECT Journal,
coupled system in services. International Journal of 22(1), 40-43, 57.
Service Technologies and Management, 1(1), 15–36.
Taleb-Ibrahimi, M., Castilho, B. D., & Daganzo, C. F.
doi:10.1504/IJSTM.2000.001565
(1993). Storage space vs. handling work in container ter-
Suomi, R., & Tahkapaa, J. (2002). The strategic role minals. Transportation Research Part B: Methodological,
of ICT in the competition between public and private 27(1), 13–32. doi:10.1016/0191-2615(93)90009-Y
health care sectors in the Nordic welfare societies-case
Talvela, J. (2006). Lyhyen kantaman langattomat tekni-
of Finland. Paper presented at the 35th Annual Hawaii
ikat (Short range wireless techniques). Kotka, Finland:
International Conference on System Sciences.
Kymenlaakso University of Applied Sciences. (Research
Supply Chain Management Institute. (2008). The supply Article 2007).
chain management processes. Retrieved February 27,
Tan, S. J. (1999). Strategies for reducing consumers’ risk
2009, from http://www.scm-institute.org/Our-Relation-
aversion in Internet shopping. Journal of Consumer Market-
ship-Based-Business-Model.htm
ing, 16(2), 163–180. doi:10.1108/07363769910260515
412
Compilation of References
Taneja, N. K. (2002). Driving Airline Business simulation supports good BSE. Engineering Management
Strategies through Emerging Technology, Ashgate, Journal, 7(2), 89–96. doi:10.1049/em:19970209
UK:Aldershot.
Tradenet Services srl, (2008). A Closer Look at Third
Tang, C. S. (1999). Supplier relationship map. Interna- Party Shipping Arrangements. Retrieved from http://
tional Journal of Logistics: Research & Applications, www.blogsharp.com/news_9626.html
2(1), 39–56. doi:10.1080/13675569908901571
Trappey, C. V., Trappey, A. J. C., Lin, G. Y. P., & Lee,
Terzi, S., & Cavalieri, S. (2004). Simulation in the sup- W. T. (2007). Business and logistics hub integration
ply chain context: a survey. Computers in Industry, 53, to facilitate global supply chain linkage. Proceed-
3–16. doi:10.1016/S0166-3615(03)00104-0 ings of the Institute of Mechanical Engineering,
Part B: J. Engineering Manufacture, 221, 1221-1233.
The Chartered Institute of Purchasing & Supply. (2005).
Retrieved June 28, 2009, from https://commerce.
Selling the benefits of purchasing: Learning network
metapress.com/content/755k858k74706609/resource-
publication. Retrieved February 27, 2009, from www.
secured/?target=fulltext.pdf&sid=4h3gmljzsnfc0q45n
ifpmm.org/files/LNPubsSellingBenefits.pdf
1ak3b55&sh=journals.pepublishing.com
Thiell, M. (2008). Strategische Beschaffung von Dien-
Triantaphyllou, E. (2000). Multi-criteria decision making
stleistungen (in English: Strategic Supply Management
methods: a comparative study. The Netherlands: Kluwer
of Services), Saarbrücken, U.S. International Trade
Academic Publishers.
Commission (2005). Logistic Services – An Overview
of the Global Market and Potential Effects of Removing Tsai, M. C., & Su, Y. S. (2002). Political Risk Assessment
Trade Impediments. Investigation No. 332-463. Wash- on Air Logistics Hub Developments in Taiwan. Journal
ington, DC. of Air Transport Management, 8, 373–380. doi:10.1016/
S0969-6997(02)00016-9
Thiers, G., & Janssens, G. (1998). A Port Simulation
Model as a Permanent Decision Instrument. Simulation, Tsai, M.-C. (2006). Constructing a logistics tracking
71, 117–125. doi:10.1177/003754979807100206 system for preventing smuggling risk of transit contain-
ers. Transportation Research, 40, 526–536.
Thompson, G., Frances, J., Levacic, R., & Mitchell, J.
(1991). Markets, hierarchies and networks: The coordina- Tugcu, S. (1983). A simulation study on the determina-
tion of social life. London: Sage. tion of the best investment plan for Istanbul seaport.
The Journal of the Operational Research Society, 34(6),
Tian, X. (2008). Research on the innovative model and
479–487.
guarantee system of the third party logistics service in
household appliance industry. Tianjing: Tianjin Poly- Turner, C. (2000). The information e-conomy, Business
technic University. strategies for competing in the digital age. London:
Kogan Page.
Tien, J. M., & Berg, D. (2003). A case for service systems
engineering. Journal of Systems Science and Systems En- U.S. Food and Drug Administration. (2009). Medication
gineering, 12(1), 13–38. doi:10.1007/s11518-006-0118-6 errors. Retrieved February 27, 2009, from http://www.fda.
gov/cder/handbook/mederror.htm van Bemmel, J. H., &
Towill, D. R. (1997a). Successful business systems
Musen, M. A. (1999). Handbook of medical informatics.
engineering. Part 1: The systems approach to business
Retrieved from http://www.mieur.nl/mihandbook/r_3_3/
processes. Engineering Management Journal, 7(1),
handbook/home.htm
55–64. doi:10.1049/em:19970109
Ueda, M., & Sekiguchi, Y. (2005). Mondaiteigi wo
Towill, D. R. (1997b). Successful business systems engi-
katuyou suru APS sofutouea sentaku tejyun no yuukousei
neering. Part 2: The time compression paradigm and how
nikansuru kenkyuu [Effectiveness of a Procedure for
413
Compilation of References
ASP Software Selection Based on Problem Specification]. Veludo, M. L., Macbeth, D., & Purchase, S. (2006).
Journal of the Japan Society for Production Manage- Framework for relationships and networks. Journal
ment, 11(2), 57–66. of Business and Industrial Marketing, 21(4), 199–207.
doi:10.1108/08858620610672560
Vaidya, K., Sajeev, A. S. M., & Gao, J. E-procurement
assimilation: an assessment of e-business capabilities Venkataramanan, M. V. (1998). Special Research Focus
and supplier readiness in the Australian public sector. on Supply Chain Linkages: Challenges for Design and
Paper presented at the 7th International Conference on Management in the 21st Century. Decision Sciences,
Electronic Commerce. 29(3).
Van Ark, B., Broersma, L., & Den Hertog, P. (2003). Venkatesh, V., Davis, F., & Morris, M. (2007). Dead
Services innovation, performance and policy: a review. Or Alive? The Development, Trajectory And Future Of
Retrieved April 30, 2009, from http://www.ez.nl/dsreso Technology Adoption Research. Journal of the Associa-
urce?objectid=143412&type=PDF tion for Information Systems., 8(4), 267–287.
van Dam, T., & Langendoen, K. (2003). An adaptive Verdone, R., Dardari, D., Mazzini, G., et al. (2008).
energy-efficient Mac protocol for wireless sensor net- Wireless sensor and actuator networks Technologies.
works. In SenSys ‘03: Proceedings of the 1st international London: Academic Press.
conference on Embedded networked sensor systems, (pp.
Vlosky, R. P., & Westbrook, T. (2002). E-business ex-
171-180). New York: ACM Press.
change between homecenter buyers and wood products
Van Hee, K. M., & Wijbrands, R. J. (1988). Decision suppliers. Forest Products Journal, 52(1), 39–43.
support system for container terminal planning. Euro-
Voigt, K.-I., & Thiell, M. (2003). Beschaffung wissensin-
pean Journal of Operational Research, 34, 262–272.
tensiver Dienstleistungen – Net Sourcing als alternative
doi:10.1016/0377-2217(88)90147-6
Bezugsform (in English: Procurement of Knowledge-
Van Riel, A. C. R., Lemmink, J., & Ouwersloot, H. based Services – Net Sourcing as Alternative Approach).
(2004). High-technology service innovation success: a In: Bruhn, M./Stauss, B. (Ed.): Dienstleistungsnetzwerke,
decision-making perspective. Journal of Product Inno- Wiesbaden, Germany (pp. 287-318).
vation Management, 21(5), 348–359. doi:10.1111/j.0737-
Voigt, K.-I., & Thiell, M. (2004). Industrielle Rück-
6782.2004.00087.x
nahme- und Entsorgungssysteme – Eine modellgestützte
Van Weele, A. J. (2005). Purchasing & supply chain Analyse alternativer Organisationsformen am Beispiel
management: Analysis, strategy, planning and practice der Automobilindustrie (in English: Industrial Reverse
(4th ed.). London: Thomson. Logistics Systems – A Model-based Analysis of Alter-
native Organizational Forms Using the Example of the
Vandaele, D., & Gemmel, P. (2007). Purchased business
Automotive Industry). In: Prockl, G./Bauer, A./Pflaum,
services influence downstream supply chain members.
A./Müller-Steinfahrt, U. (Ed.): Entwicklungspfade und
International Journal of Service Industry Management,
Meilensteine moderner Logistik – Skizzen einer Road-
18, 307–321. doi:10.1108/09564230710751505
map, Wiesbaden, Germany (pp. 389-418).
Vargo, S. L., & Lusch, R. F. (2004). Evolving to a new
Wagner, S. M., & Boutellier, R. (2002, November-
dominant logic for marketing. Journal of Marketing,
December). Capabilities for managing a portfolio of
68(1), 1–17. doi:10.1509/jmkg.68.1.1.24036
supplier relationships. Business Horizons, 45(6), 79–88.
Vargo, S. L., & Lusch, R. F. (2008). Services Dominant doi:10.1016/S0007-6813(02)00263-X
Logic, Continuing the evolution. Journal of the Academy
Walker, W. E. (2000). Policy Analysis: A Systematic
of Marketing Science, 36(1), 1–10. doi:10.1007/s11747-
Approach to Supporting Policymaking in the Public Sec-
007-0069-6
414
Compilation of References
tor. Journal of Multi-criteria Decision Analysis, 9(1-3), ceedings of AMIA 2005 Annual Symposium, pages
11–27. doi:10.1002/1099-1360(200001/05)9:1/3<11::AID- 1182-1183.
MCDA264>3.0.CO;2-3
Waters, D. (2003). Logistics An Introduction to Supply
Walston, S. L., & Chadwick, C. (2003). Perceptions Chain Management. London: Palgrave Macmillan.
and misperceptions of major organizational changes in
Webservices. (2009). Webservices. Retrieved March 9th,
hospitals: Do change efforts fail because of inconsistent
2009, from http://www.webservices.org/
organizational perceptions of restructuring and reengi-
neering? International Journal of Public Administration, Webster, F., & Malter, A., & Shankar Ganesan. (2005). The
26(14), 1581–1605. doi:10.1081/PAD-120024412 Decline and Dispersion of the Marketing Competence,
MIT. Sloan Management Review, 46(4), 35–43.
Wang, G. (2004). Manufacturing Supply Chain Design
and Evaluation. International Journal of Advanced WEF. (2008). The Global Competitiveness Report
Manufacturing Technology, 25, 93–100. doi:10.1007/ 2008–2009. London: Palgrave Macmillan.
s00170-003-1791-y
Wegner, P. (1996). Interoperability. ACM Computing
Wang, N., Zhang, N., & Wang, M. (2006). Wireless Surveys, 28(1), 285–287. doi:10.1145/234313.234424
sensors in agriculture and food industry - Recent de-
Wegner, U. (1993). Organisation der Logistik – Proz-
velopments and future perspective. Computers and
ess- und Strukturgestaltung mit neuer Informations- und
Electronics in Agriculture, 50(1), 1–14. doi:10.1016/j.
Kommunikationstechnik (in English: Organization of
compag.2005.09.003
Logistics – Process- and Structure-design with Modern
Wang, R. Y. (1998). A product perspective on total data Information and Communcation Technology), Berlin,
quality management. Communications of the ACM, 41(2), Germany.
58–65. doi:10.1145/269012.269022
Weick, K. E. (1995). Sensemaking in organizations.
Wang, W. B., Han, T., Zhang, X. D., Wu, H. D., & Shui, Y. Thousand Oaks, CA, Sage.
A. (2007). Rayleigh wave reflection and scattering calcu-
Wei-Ning, P., & Chinyao, L. (2005). Supplier evaluation
lation by source regeneration method. IEEE Transactions
and selection via Taguchi loss functions and an AHP.
on Ultrasonics, Ferroelectrics, and Frequency Control,
International Journal of Advanced Manufacturing
54(7), 1445–1453. doi:10.1109/TUFFC.2007.405
Technology, 27(5-6).
Wang, X., & Chen, G. 2007). The services innovative
Weng, M., & Sedani, M. (2002). Schedule One Machine to
research on third-party logistics enterprise. Journal of
Minimize Early/Tardy Penalty by Tabu Search. Retrieved
Modern management science, 2, 5-7.
from http://fie.engrng.pitt.edu/iie2002/proceedings/ierc/
Wang, Y., Potter, A., & Naim, M. (2007). Elec- papers/2208.pdf
tronic marketplaces for tailored logistics. Indus-
West, D. C. (1997). Purchasing Professional Services
trial Management & Data Systems, 107(8), 1170–1187.
– The Case of Advertising Agencies. In. International
doi:10.1108/02635570710822804
Journal of Purchasing and Materials Management,
Want, R., Farkas, K. I., & Narayanaswami, C. (2005). 33(3), 2–9.
Guest editors’ introduction: Energy harvesting and
White, A. (2005). RFID: Why reusable asset tracking is
conservation. Pervasive Computing, IEEE, 4(1), 14–17.
the best place to start. San Jose, CA: BEA White Paper,
doi:10.1109/MPRV.2005.12
BEA Systems Inc.
Waterman, J., et al. (2005). Demonstration of SMART
White, R. M., & Voltmer, F. W. (1965). (n.d.). “Direct
(Scalable Medical Alert Response Technology). Pro-
piezoelectric coupling to surface elastic waves. Applied
Physics Letters, 7, 314–316. doi:10.1063/1.1754276
415
Compilation of References
Wholey, D. R., & Burns, L. R. (2003). Understanding ment. In Lipsey and Nakamura (eds.), Service Industries
health care markets: Actors, products, and relations. and the Knowledge Based Economy. Calgary, Canada:
In S. S. Mick & M. E. Wyttenbach (Eds.), Advances University of Calgary Press.
in Health Care Organization Theory (pp. 99-139). San
Womack, J. P., & Jones, D. T. (2005, March). Lean Con-
Francisco: Jossey-Bass.
sumption. Harvard Business Review, 58–68.
Wiesbaden, Siebert, H. (1999). Ökonomische Analyse
Woo, A., & Culler, D. E. (2001). A transmission control
von Unternehmensnetzwerken (in English: Economic
scheme for media access in sensor networks. In Mobi-
Analysis of Business Networks). In: Sydow, J. (Ed.):
Com ‘01: Proceedings of the 7th annual international
Management von Netzwerkorganisationen.Wiesbaden,
conference on Mobile computing and networking, (pp.
Germany (pp. 7-27).
221-235). New York: ACM Press.
Wiese, N. J. (2004). Market characteristics of farm-
Wood, A. D., & Stankovic, J. A. (2002). Denial of service
raised catfish. M.S. dissertation, University of Arkansas
in sensor networks. Computer, 35(10), 54–62. doi:10.1109/
at Pine Bluff.
MC.2002.1039518
Wigand, R. (2006). Electronic value chains: supply chain
Woodside, A. G. (1972). Informal group influences on risk
management and RFID. Proceedings of the International
taking. JMR, Journal of Marketing Research, 9(May),
INFORMS Conference. Hong Kong.
223–225. doi:10.2307/3149962
Wikipedia (2009). Brute Force Search. Retrieved from
Woodside, A. G. (1974). Is there a generalised risky
http://en.wikipedia.org/wiki/Brute-force_search
shift phenomenon in consumer behaviour? JMR,
Wikipedia (2009). First In First Out. Retrieved fromhttp:// Journal of Marketing Research, 11(May), 225–226.
en.wikipedia.org/wiki/FIFO doi:10.2307/3150569
Wikipedia (2009). Local Search. Retrieved from http:// World Competitiveness Yearbook (2001-2004).World
en.wikipedia.org/wiki/Local_search_(optimization) Competitiveness Yearbook. Lausanne, Switzerland:
International Institute for Management Development
Wilding, R., & Delgado, T. (2004). RFID – Applica-
tions within the Supply Chain. Supply Chain Practice, World Health Organization. (2005). eHealth: Report by
6(2), 36–49. the Secretariat.Retrieved February 27, 2009, from http://
www.who.int/gb/ebwha/pdf_files/WHA58/A58_21-en.
Wilkes, L. (2004). Principles of Service Orientation.
pdf
CBDI Journal, March.
World, S. L. A. (2002). SLA Toolkit. Retrieved from
Williamson, O. E. (1979). Transaction-cost economics:
http://www.sla-world.com/
The governance of contractual relations. The Journal of
Law & Economics, 22(2), 233–261. doi:10.1086/466942 Wu, D., & Olson, D. L. (2008). Supply chain risk,
simulation, and vendor selection. International Journal
Wilson, I. D., Roach, P. A., & Ware, J. A. (2001). Container
of Production Economics, 114, 646–655. doi:10.1016/j.
stowage preplanning: using search to generate solution,
ijpe.2008.02.013
a case study. Knowledge-Based Systems, 14, 137–145.
doi:10.1016/S0950-7051(01)00090-9 Wurman, R. S. (1990). Information Anxiety. New
York:Bantam.
Wind, Y. (2008). A plan to invent the Marketing we need
today. MIT Sloan Management Review, 49(4), 21–28. www.srv.ch (2005, September). Swiss Issues: Le marché
des voyages: Entre globalisation et pression des coûts.
Wolfl, A. (2006). Productivity Growth in The Services
Industries – Patterns, Issues and the Role of Measure-
416
Compilation of References
X-Change Corporation Delivers Surface Acoustic Wave TFP Methods: Testing the Criticism of Overinvest-
(SAW) Tag Technology for the Oil and Gas Industry. ment in Japanese Regional Airports. Transportation
Retrieved from http://www.thefreelibrary.com/X-C Research Part E, Logistics and Transportation Review,
hange+Corporation+Delivers+Surface+Acoustic+ 40, 533–546. doi:10.1016/j.tre.2004.08.003
Wave+(SAW)+Tag... -a0176649458
Younis, M., Youssef, M., & Arisha, K. (2002). Energy-
Xianwei, S., & Zhang, Z. (2001). The Service model and aware routing in cluster-based sensor networks. Proceed-
development research of modern Logistics. Science of ings of the 10th IEEE/ACM International Symposium on
Science and Management of S. & T, 12, 46–50. Modeling, Analysis and Simulation of Computer and
Telecommunications Systems on, (p.129).
Xu, H., Sharma, S. K., & Hackney, R. (2005). Web ser-
vices innovation research: towards a dual-core model. Yun, S., Lee, J., Chung, W., Kim, E., & Kim, S. (2008).
International Journal of Information Management, 25(4), A soft computing approach to localization in wireless
321–334. doi:10.1016/j.ijinfomgt.2005.04.004 sensor networks. Expert Systems with Applications, 36(4),
7552–7561. doi:10.1016/j.eswa.2008.09.064
Yamada, Y. (1984). Manegiment sisutemu to OR:
tokushuu ni attate [Management system and OR: In Yun, W. Y., & Choi, Y. S. (1999). A simulation model
planning for this special topic]. Operations research as for container-terminal operation analysis using an
a management science research, 29(11), 632. object-oriented approach. International Journal of
Production Economics, 59, 221–230. doi:10.1016/S0925-
Yao, Y., Palmer, J., & Dresner, M. (2007). An interorgani-
5273(98)00213-8
zational perspective on the use of electronically-enabled
supply chain. Decision Support Systems, 43, 884–896. Yung, Y. H., Chang, C. P., & Hsien, M. C. (2008). Air Cargo
doi:10.1016/j.dss.2007.01.002 as an Impetus Economic Growth through the Channel of
Openness: the Case of OECD Countries. International
Yasin, M. M., Czuchry, A. J., Gonzales, M., & Bayes, P.
Journal of Transport Economics, 35(1), 31–44.
E. (2006). E-commerce implementation challenges: Small
to medium sized versus large organizations. International Zanping, L. (2005). Service science-an emerging science
Journal of Business Information Systems, 1(3), 256–275. in 21st century. China Information Review, 511-13.
doi:10.1504/IJBIS.2006.008599
Zeithaml, V. A., Bitner, M. J., & Gremler, D. D. (2006).
Ye, W., Heidemann, J., & Estrin, D. (2001). An energy- Services Marketing: Integrating Customer Focus across
efficient MAC protocol for wireless sensor networks. the firms, 4th ed., New York: McGraw-Hill
Proceedings of Twenty-First Annual Joint Conference
Zeithaml, V. A., Parasuraman, A., & Berry, L. L. (1985).
of the IEEE Computer and Communications Societies,
Problems and strategies in services marketing. Journal
3, 1567-1576.
of Marketing, 49, 33–46. doi:10.2307/1251563
Yilmaz, C., & Hunt, S. D. (2001). Salesperson coopera-
Zeithaml, V., Berry, L., & Parasuraman, A. (1988).
tion: The influence of relational, task, organizational, and
Communication and control processes in the delivery
personal factors. Journal of the Academy of Marketing
of service quality. Journal of Marketing, 52, 35–48.
Science, 29(4), 335–357. doi:10.1177/03079450094207
doi:10.2307/1251263
Yin, R. (1989). Case Study Research: Design and Methods.
Zeithaml, V., Berry, L., & Parasuraman, A. (2004).
2nd Edition, Newbury Park, CA: Sage
Service Quality. Marketing Science Institute.
Yoshida, Y., & Fujimoto, H. (2004). Japanese-Airport
Zeng, Y. E., Wen, H. J., & Yen, D. C. (2003). Cus-
Benchmarking with the DEA and Endogenous-Weight
tomer relationship management (CRM) in busi-
417
Compilation of References
ness-to-business (B2B) e-commerce. Information Zhang, C., Liu, J., Wan, Y.-W., Murty, K. G., & Linn, R.
Management & Computer Security, 11(1), 39–44. J. (2003). Storage space allocation in container terminals.
doi:10.1108/09685220310463722 Transportation Research Part B: Methodological, 37,
883–903. doi:10.1016/S0191-2615(02)00089-9
Zhang, A. M. (2002). Electronic Technology and Simpli-
fication of Customs Regulations and Procedures in Air Zhang, C., Wan, Y.-W., Liu, J., & Linn, R. (2002). Dy-
Cargo Trade. Journal of Air Transportation, 7, 87–102. namic crane deployment in container storage yards.
Transportation Research Part B: Methodological, 36(6),
Zhang, A. M. (2003). Analysis of an International Air
537–555. doi:10.1016/S0191-2615(01)00017-0
Cargo Hub: the Case of Hong Kong. Journal of Air
Transport Management, 9, 123–138. doi:10.1016/S0969- Zhang, Z., Cheng, T., & Yan, B. (2006). A Portal of
6997(02)00066-2 Logistics Service Provider to Integrate Supply Chain. In
Proceedings of the 2006 IEEE Asia-Pacific conference
Zhang, A. M., & Zhang, Y. M. (2002a). Issues on Lib-
on Services Computing (APSCC’06).
eralization of Air Cargo Services in International Avia-
tion. Journal of Air Transport Management, 8, 275–287. Zhen, L. (2007). Study on the logistics industry disparity
doi:10.1016/S0969-6997(02)00008-X between China and developed country. Journal of Fuiian
Radio & TV University, 3, 35–37.
Zhang, A. M., & Zhang, Y. M. (2002b). A Model of
Air Cargo Liberalization: Passengers vs. All- Cargo ZVEI - Institut für Zukunftsstudien und Technologie-
Carriers. Transportation Research Part E, Logistics bewertung. (2007). Integrierte Technologie-Roadmap.
and Transportation Review, 38, 175–191. doi:10.1016/ Retrieved from http://www.ttn-hessen.de/npkpublish/
S1366-5545(02)00004-2 filestore/77/zvei.pdf
418
419
Zongwei Luo is a senior researcher at the E-business Technology Institute, The University of Hong
Kong (China). Before that, he was working at the IBM TJ Watson Research Center in Yorktown Height
(NY, USA). He also served as the Affiliate Senior Consultant to ETI Consulting Limited. His research
has been supported by various funding sources, including China NSF, HKU seed funding, HK RGC,
and HK ITF. His research results have appeared in major international journals and leading confer-
ences. He is the founding Editor-in-Chief of the International Journal of Applied Logistics and serves
as an associate editor and editorial advisory board member in many international journals. Dr. Luo’s
recent interests include applied research and development in the area of service science and computing,
innovation management and sustainable development, technology adoption and risk management, and
e-business model and practices, especially for logistics and supply chain management.
***
Mairead Brady is a Lecturer in Marketing at the School of Business, Trinity College Dublin lecturing
at undergraduate, masters and to experienced managers. She is a co-author on the 1st European edition
Copyright © 2010, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
About the Contributors
of the classic Kotler text: Kotler, Keller, Brady, Goodman and Hansen,(2009) Marketing Management,
European Edition.. Her research focuses on the assimilation of information and communication tech-
nologies (ICT) into contemporary marketing practice (CMP), service organisations and along global
supply networks (GSN). She is the author of many journal articles including the Journal of Marketing
Management, the Journal of Business and Industrial Marketing, International Journal of Technology
Marketing, and Management Decision along with many conference publications including the European,
British and Irish Academy of Management and Marketing conferences.
Armando Cartenì, Civil Engineering degree on Transportation at the University of Naples “Federico
II” and PhD in Transportation System Analysis since 2004, is research assistant at the University of Sal-
erno. Research activity has been focused on the development of models and methods for transportation
system both for passenger and for freight, main topics are: demand flow direct and indirect estimation;
freight demand models (trip and tour based); aggregate and disaggregate models for transportation
terminal analysis. Results of research activity, carried out within national and international research
projects. He has published over thirty papers on his research in national and international journals and
proceedings.
Nathan S. Caswell is a Sr. Consultant with Janus Consulting focused on enabling businesses to im-
prove strategic effectiveness, adaptability, manageability, and efficiency by aligning strategic, operational,
and IT systems. Over a 27 year career at the IBM Thomas J. Watson Research Center he developed
methods for engineering business management and operational systems while leading several projects
in the HealthCare, Retail, Food Service, Manufacturing, and Business Transformation areas. Recent
work has involved developing analysis models for networks of mutually outsourced businesses. He has
received project related awards, holds several patents and authored over 25 professional publications.
Miguel Gaston Cedillo-Campos is a Professor of Supply Chain Management and Director of the
Supply Chain Research and Development Center in the Tecnológico de Monterrey. He is also a Research
Associate for the Logistics Systems Research Unit at COMIMSA. In 2004, he received with honors a
PhD degree in Logistics Systems Dynamics from the University of Paris, France. He has worked for
logistics businesses in Mexico and as a consultant on supply chain management for companies like
Daimler-Chrysler, Caterpillar, Mabe, WTC Confianza, IBM, Met-Mex Peñoles, and several Mexican
State Governments. His current research interests include service operations in supply chains, supply
chain security, urban distribution, and design of supply chains oriented to emerging markets. He is co-
author of book “Dynamic Analysis of Industrial Systems” published by Editorial Trillas.
Yupo Chan is Professor & Founding Chair of the Systems Engineering Department at the University
of Arkansas at Little Rock. He received his BS degree in civil engineering, MS degree in transportation
systems/economics and Ph.D. degree in operations research, all from the Massachusetts Institute of
Technology. Dr. Chan has written numerous journal articles and books. The most recent ones include:
Location, Transport and Land-use: Modeling Spatial-Temporal Information, Springer-Verlag, Forthcoming,
750 pages (with Web-based software) and Location Theory and Decision Analysis, ITP/South-Western,
2000, 533 pages. (with Computer Software disk) His research interests include telecommunication sys-
tems, transportation systems, networks and combinatorial optimization, multi-criteria decision-making,
spatial-temporal information, econometrics and technology assessment. He has previously held faculty
420
About the Contributors
positions at the Air Force Institute of Technology, Washington State University, State University of New
York, Stony Brook and Pennsylvania State University. Dr. Chan is a Fellow of the American Society of
Civil Engineers and has won numerous awards for his work, including the Harland Bartholomew Award
of the American Society of Civil Engineers, the Koopman Prize of the Operations Research Society of
America and a Congressional Fellowship with the Office of Technology Assessment.
Chia-Chu Chiang is an associate professor at the Computer Science department of the University
of Arkansas at Little Rock (UALR). Prior to joining UALR, he worked for VIASOFT, a software devel-
opment company, in Phoenix. Dr. Chiang obtained his Ph.D in Computer Science from Arizona State
University in 1995. For many years, he has worked on several projects sponsored by NSF, DOD, and
industrial companies including Syntell and Acxiom. His research results have been published in journals,
conferences, and book chapters. He is a member of ACM, IEEE, and ABET. Also, he often volunteers
to work for conference chairs, reviewers, committee members, and journal editors.
Madan Mohan Dey is a Professor of Aquaculture Economics and Marketing, University of Arkansas
at Pine Bluff (UAPB), USA. He is an agricultural economist with twenty years of post PhD experience
in multi-disciplinary agricultural research and development activities. His main areas of expertise in-
clude aquaculture economics and marketing, international trade policy analysis, food sector modeling,
impact assessment, economics of development and diffusion of agricultural technologies, and project
planning and management. Before joining UAPB, he worked for various institutes (The WorldFish
Center, International Rice Research Institute, and International Food Policy Research Institute) of the
Consultative Group of International agricultural Research (CGIAR) system for more than 15 years. He
served the Government of Bangladesh for 10 years in different capacities (teaching, research and policy
planning), and have conducted collaborative research with other advanced research institutes including
the Yale University (USA).
Martin R. Fellenz received his Ph.D. from the Kenan-Flagler Business School at The University
of North Carolina at Chapel Hill. He is Senior Lecturer in Organisational Behaviour and Director of
Postgraduate Teaching & Learning at the School of Business, University of Dublin, Trinity College. He
regularly consults with leading domestic and international firms. Much of this work is located at man-
agement board level and focuses on enabling client organizations to adapt to environmental, strategic
and technological change, and on developing management capabilities to successfully lead and manage
421
About the Contributors
such changes. His research focuses on behavioural aspects of organisational change and transformation,
in particular the implications of environmental and technological change for individuals, organisational
design, and management processes and practices. In addition, he studies organisational justice and fair-
ness; managerial and organisational aspects of evolving global business systems (with a particular focus
on service industries); and issues in higher education and management development.
Erwin Fielt is currently a member of the Business Process Management Group of the School of
Information Technology at the Queensland University of Technology. In his research, he focuses on the
intersection between business and ICT where new ICT applications have to result in net benefits for in-
dividuals and organizations. Erwin Fielt works as Postdoctoral Research Fellow in the Business Service
Management project of the Smart Services CRC. Within this project, he is responsible for coordinating
the involvement of the different academic and industry partners and he conducts research on Service
Oriented Business Models, Service Portfolio Management and Service Quality Management. Erwin
Fielt has a PhD from the Delft University of Technology and a MSc from the University of Twente,
both in the Netherlands.
Emmanuel Fragnière is Service Operations Management and Risk Management Professor at the
Geneva School of Business Administration (HEG). He is head of LEM-HEG, an institute specialized
in market researches. He is a Lecturer in Management Science at the School of Management of the
University of Bath (United Kingdom). He previously occupied senior positions in risk management
(Banque Cantonale Vaudoise, the fourth largest bank of Switzerland and Cargill). His research inter-
ests are primarily in risk management and knowledge-based services design and control. His previous
research appears in European Journal of Operations Research, Management Science, Interfaces and
Environmental Modeling and Assessment.
G.R. Gangadharan is a research scientist at Novay (formerly Telematica Institute), Enschede, The
Netherlands. His research interests are mainly located on the interface between technological and busi-
ness perspectives. His research interests include service oriented computing, Internet software engineer-
ing, intellectual property rights, free and open source systems, and business models for software and
services. Dr. Gangadharan has published several research papers in international journals, conference
proceedings, and book chapters. He is codesigner of ODRL-S, a language for describing service licenses.
He has a PhD in information and communication technology from the University of Trento, Trento,
Italy, an MS in information technology from the Scuola Superiore Sant’Anna, Pisa, Italy, and an MSc
in computer science from Manonmaniam Sundaranar University, Thirunelveli, India. Dr. Gangadharan
is a member of the IEEE society. He can be reached at gr@novay.nl
422
About the Contributors
Roman Gumzej, born 1970 in Maribor, Slovenia, received a doctorate in computer science and
informatics from University of Maribor in 1999. He worked both in industry (Institute of Information
Science, IZUM Maribor) and academia (University of Maribor), before he was elected assistant professor
at the Faculty of electrical engineering and computer science at University of Maribor in 2004. He was
a visiting researcher at ifak e.V. Magdeburg, Germany in 2002 and at the Chair of Computer Engineer-
ing at Fernuniversität in Hagen, Germany in 2007. Currently he is assistant professor at the Faculty of
logistics at the same university. His research interests comprise all major areas of hard real-time com-
puting with special emphasis on operating systems, co-design and quality-of-service in embedded and
logistics applications. He has conducted a national and co-operated in several national and international
research projects. He has authored or co-authored several refereed book chapters, and about 40 journal
publications and conference contributions, and is involved in international professional organizations
and program committees of several conferences.
Tao Han was born in Shandong Province, China, in 1973. He received his master’s degree in au-
tomatic control engineering from Shandong University of Technology, Jinan, China, in 1999. In 2002,
he received the Ph.D. degree in instrument science and technology from Shanghai Jiaotong University,
Shanghai,China. His Ph.D. dissertation was on the wireless SAW sensors and identification tags. He
currently works in Shanghai Jiaotong University as an associate professor. His research interests are in
the field of acoustic sensors and signal processing in measurement. Dr. Han is a member of IEEE, and
a senior member of China Instrument and Control Society.
Sergio Hernandez is a Ph.D. candidate in Industrial and Systems Engineering at Florida International
University, Miami, and holds a MBA from Universidad de los Andes, Bogotá. Since 2003 he works as
Assistant Professor at the Universidad de los Andes School of Management, Bogotá, teaching Modeling
in the undergraduate program and Value Network Management in the graduate program. He also works
as consultant at the Center for Strategy and Competitiveness (CEC) of UniAndes School of Management.
Formerly he was a Manager and Senior Consultant at Deloitte and Arthur Andersen.
Luo Jing earned her Master of Art majoring in English in Northwestern Polytechnic University of
China, with an emphasis in applied linguistics, translation and cross-cultural communication. Now she
works as a teacher in Shenzhen Tourism College of Jinan University. Her research focuses on tourism
English, business English and culture.
Manjunath Kamath is Professor and Graduate Program Director of Industrial Engineering and Man-
agement, Oklahoma State University, Stillwater, OK. He is also the Director of the Center for Computer
Integrated Manufacturing Enterprises and Associate Site Director of the Center for Engineering Logistics
423
About the Contributors
Ying Tat Leung is a Research Staff Member in the Services Research Department at the IBM Al-
maden Research Center in California. His current research interests are on the modeling of different
aspects of service enterprises, including their business strategy, business performance, and the value of
their business transformation. Before moving to Almaden in 2004, he spent almost 10 years at the IBM
Thomas J. Watson Research Center in New York, working on various subjects spanning the entire supply
chain. Prior to IBM, he was a Senior Member of Research Staff at Philips Laboratories, the research
arm of Philips Electronics, in New York. Ying Tat holds a B.Sc. from the University of Hong Kong,
M.S. and Ph.D. degrees from the University of Wisconsin – Madison, all in Industrial Engineering.
Gong Li, presently a PhD student majoring in Industrial Engineering at North Dakota State University.
He obtained his B.E. degree of Mechanical Engineering and M.E. degree of Mechatronic Engineering
in 1996 and 2003, respectively, from China University of Mining and Technology, China. Having ac-
cumulated more than ten years’ research experience, Mr. Li’s research interests include green supply
chain management, advanced manufacturing technology, electromechanical integration technology,
process simulation and optimization. Mr. Li is a member of IIE and ASME.
Yang Li is a principal research scientist from British Telecom (BT). He received BSc, MSc and PhD
degrees in computer science and has applied intelligent technology to the areas of service creation,
marketing, delivery and management. Yang is an inventor of 17 granted and filed patents, and founded
IEEE international workshop series on “Barriers towards Internet-Driven Information Services”. He
published extensively in the leading journals and conferences, winning accolades such as “top accessed
article in IJSEKE” and “BT Gordon Radley papers premium”. Beyond his thought leadership, Yang
has also successfully led the downstream of his research innovations to BT Lines of Business, such as
automated service reservation tool, saving millions of pounds for the company. He is a frequent indus-
trial supervisor for MSc, PhD students and graduates from top UK universities and also serves as an
editorial member for a number of international journals, conferences and workshops.
Martin Lipičnik, born 1947 in Celje, received a doctorate from the Faculty for Architecture, Civil
engineering and Geodesy at the University of Ljubljana in 1984. After graduation he started to work
on projects for a construction company in Celje in 1970 where he held the position of the head of the
construction sector. After that he pursued his academic career by continuing his studies at the Faculty
of civil engineering in Zagreb from which he obtained the Master of Science degree in 1979. He was a
co-founder of the Roads and road-traffic department at the Faculty of Technical sciences at the Univer-
sity of Maribor. After the foundation of the Faculty of Civil Engineering at the same university he was
one of the initiators of the study-program Traffic Engineering at this faculty and successfully led the
program-research group Traffic and Logistics for a number of years. He founded the Institute of Traffic
Sciences to examine the harmonized function of the uniform traffic system and led the Traffic manage-
ment project team after the foundation of the Centre for Interdisciplinary and Multidisciplinary research
424
About the Contributors
and Studies of the University of Maribor in 2001. At about the same time when the project team grew
into the Institute of logistics CIMRS UM, he was empowered the manager of the newly-founded Faculty
of logistics at the University of Maribor and since then holds the position of the dean. He is involved in
numerous national and international professional organizations and conference boards as president or
member. Among other he is president of the annual traditional International scientific and professional
congress named Transport, Traffic, Logistics and member of the Committee for international relations at
the University of Maribor. He also led the project council for the Optimization of the public bus traffic
in the Republic of Slovenia at the Ministry of Transport, and has been a member of the project council
for the preparation of the traffic policy of the Republic of Slovenia. He is a national coordinator of the
international COST project (COST C6 - “Towns and infrastructure planning for safety and urban qual-
ity for pedestrian”) and national coordinator of the bilateral scientific cooperation with the Republic of
Hungary and with the Republic of Croatia. He also led the projects of the Slovenian distribution centers
for the Slovenian Logistics Cluster (TLG). He is author of six books, two patents and many articles
published in magazines, congresses and symposiums.
Joyce M.W. Low is a Research Fellow in the National University of Singapore. She received her
Bachelor’s and Master’s degrees from the Business School before obtaining her PhD degree in 2009
from the same university. Parts of her doctoral dissertation have been published in respectable journals
such as Journal of Air Transport Management, Transportation Research Parts A and E, Networks and
Spatial Economics and International Journal of Production Economics. She is also an active reviewer
for a number of international journals in the disciplines of transportation, logistics and economics.
Tobias Mettler at present, after working several years in the consulting business, is employed as
researcher at the Competence Center Health Network Engineering, Institute of Information Management
at the University of St. Gallen (http://ehealth.iwi.unisg.ch). He holds a master’s degree in information
systems of the University of St. Gallen and is currently working on his PhD in the field of organizational
change engineering of health service providers.
Farhad Moeeni is professor of Computer and Information Technology and the Founding Director
of the Automatic Identification Laboratory at Arkansas State University. He holds a M.S. degree in
industrial engineering and a Ph.D. in operations management and information systems, both from the
University of Arizona. His articles have been published in various scholarly outlets including Decision
Sciences Journal, International journal of Production Economics, International Journal of Production
Research, International Transactions in Operational Research and several others. He is a frequent guest
425
About the Contributors
lecturer on the subject of information systems at the “Centre Franco Americain”, University of Caen,
France. Current research interests are primarily in the design, analysis and implementation of automatic
identification for data efficiency and quality. Methodological interests include design of experiments,
simulation and operations research techniques. He is one of the pioneers in designing and teaching the
subject of automatic identification within MIS programs. Dr. Moeeni is currently the principle inves-
tigator of a multi-university research project funded by Arkansas Science and Technology Authority,
Co-founder of Consortium for Identity Systems Research and Education (CISRE), and on the Editorial
Board of the International Journal of RF Technologies: Research and Applications.
Zhang Mu is a professor and Chief of the GIS & Tourism Laboratory at the Shenzhen Tourism
College of Jinan University, China. He earned his Bachelor and Master degree both major in Geogra-
phy and later received a diploma and a Ph. D degree in Geography from Fujian Normal University of
China, mainly focus on the GIS application in resources development and environment protection. In
his postdoctoral research, he also engaged in GIS technology applications and the projects researches
have involved agriculture, land use and tourism planning. Since 1985, he has been working as a teacher
in college and university for more than 23 years and involved in several national and local government
R&D projects. His research interests include geography, e-commerce in tourism, tourist resources
development & planning, and the GIS application in tourism. He has more than 70 publications to his
credit in Chinese and international journals or conferences in these areas.
Antti Posti (26) graduated as a Master of Science in Department of Industrial Engineering and
Management, majoring in Logistics and Supply Chain Management at Lappeenranta University of
Technology in 2009. Posti did his Master’s Thesis at University of Turku in the Centre for Maritime
Studies in the research project, which examined Finnish transit traffic and value-added services related
to it. He has also completed a Bachelor’s Degree in Electronics and Telecommunications Engineering at
Kymenlaakso University of Applied Sciences in 2006. Posti has worked in different types of jobs mainly
in the fields of logistics and information technology. Currently, Posti works at University of Turku in
the Centre for Maritime Studies as a researcher in the project, which studies the role of tracking and
tracing of cargo deliveries in seaport related supply chain. The main purpose of the project is to clarify,
in which ways the companies in the supply chain track and trace the transportations.
426
About the Contributors
2005. Pulli did her Master’s Thesis in the research project, which studied electronic invoicing and the
factors that affect the adoption of electronic invoicing in companies. Pulli has worked, among others, as
a production planner at a telecommunication industry company Tellabs. Currently, Pulli works at Univer-
sity of Turku in the Centre for Maritime Studies as a researcher in the project, which studies the role of
tracking and tracing of cargo deliveries in seaport related supply chain. The main purpose of the project
is to clarify, in which ways the companies in the supply chain track and trace the transportations.
Peter Rohner is managing the Competence Center Health Network Engineering which is concerned
with e-government and e-health issues, at the Institute of Information Management at the University of
St. Gallen (http://ehealth.iwi.unisg.ch). He earned a master`s degree in information systems and a doctor-
ate degree with a work on architecture and integration of distributed systems. He is currently working
on his postdoctoral lecture qualification in the areas of e-government and e-health. He is a member of
several Swiss national expert panels in these two interconnected fields and managing partner of BEG
& Partners, a consultancy specialized in management of hospitals and public administrations (http://
www.begpartners.com).
Jing Shi received his Ph.D. in industrial engineering from Purdue University, West Lafayette, IN,
USA in 2004. He is currently an Assistant Professor in the Department of Industrial Engineering at North
Dakota State University, Fargo, ND, USA. His research interests include wireless sensor network/RFID,
computer vision, structure health monitoring, and mathematical modeling for renewable energy and
health care systems. He has authored more than 40 papers on these topics, which have been published
in referred journals and conference proceedings. Dr. Shi is also a member of IEEE, IIE, and ASME.
Yongan Shui graduated from the physics Department of Beijing University, Beijing, China in 1953.
Since 1978, he has been an associate professor and professor with the Institute of Acoustics at Nanjing
University, Nanjing, China. He was a visiting scientist at Ginzton Laboratory of Stanford University,
Stanford, CA, from 1982 to 1983; a research professor at the Polytechnik Institute of New York in 1983;
an invited professor at ′Ecole Sup′erieure de Physique et de Chimie Industrielles de la Ville de Paris
(ESPCI), Paris, France, from 1987 to 1988; a visiting professor at the Material Research Laboratory,
Pennsylvania State University, University Park, PA, from 1983 to 1984. He now is retired from Nanjing
University and works as adjunct professor of Shanghai Jiaotong University, Shanghai, China. Professor
Shui is a fellow of the Acoustic Society of China. His research interests include surface acoustic wave
(SAW), SAW devices, ultrasonic transducers, and nonlinear acoustics. He has published more than 80
papers and received many awards from the State Education Ministry, Jiangsu Province, and the Ministry
of Electronics of China.
Mario Cantú Sifuentes is a Professor of Industrial Statistics and a Research Associate for the Logistics
Systems Research Unit at COMIMSA. He got the Industrial Engineering degree at the Saltillo Institute
of Technology. He received a PhD degree in Statistics from the University of Chapingo, Mexico. Dr.
Cantú-Sifuentes has a Master in Science Degree in Nuclear Engineering from the National Polytechnic
Institute of Mexico and a Master in Science Degree in Statistics from the Universidad Autónoma An-
tonio Narro. From 1977 to 1983 he worked in projects for private and public sectors. His research work
in statistics has been published in several leading academic journals and international conferences.
427
About the Contributors
Loon Ching Tan is an Associate Professor and Head of the Department of Industrial and Systems
Engineering in the National University of Singapore. He obtained a PhD degree in 1992 from Cornell
University in the field of Operations Research. He is on the editorial review board of the Journal of
Quality Technology and has been an active reviewer for a number of international journals. He has been
consulted on problems demanding innovative applications of probability, statistics and other operations
research techniques; and is also a well-known trainer in Six Sigma.
Albert K. Toh is an associate professor of psychology in the Departments of Social & Behavioral
Sciences, University of Arkansas at Pine Bluff (UAPB). He received his MSc. Degree in applied
psychology from Aston University, UK, and Ph.D. in Human Factors/Psychology from University of
South Dakota (1983). He was a visiting scientist at the Cognitive Science Lab of Catholic University of
America, and has held academic positions in Nebraska and Ohio. Prior to the academia, he has previ-
ously worked as a Human Factors professional in the US Department of Transportation and various
consulting companies in the areas of traffic safety and applied cognitive research. His current research
interests include Human Factors in supply chain/logistics, collaborative e-commerce, and risk percep-
tion and analysis.
Magali Dubosson Torbay is Marketing Professor and Director of the Geneva School of Business
Administration (HEG) where she teaches Services marketing and Marketing Strategy. She is also a
Lecturer at Ecole Polytechnique Fédérale de Lausanne (EPFL, Switzerland) and Essec Management
Education (Paris, France). How to price and distribute knowledge-based services are her core research
areas. She is also working on the following academic topics: services marketing, internet business models,
web 2.0 marketing, e-services, netnography, service risk management, and wealth management. Her
previous research appears in Journal of Services Research (IIMT), Journal of Wealth Management and
Thunderbird International Management Review.
Marcus Thiell holds a Ph.D. in Business Administration (Dr. rer. pol.) from Friedrich-Alexander-
University in Erlangen-Nuremberg, and a MBA (Diplom-Kaufmann) from Hamburg University. He has
worked as Research Associate at the Department of Industrial Management at the Friedrich-Alexander
University in Nuremberg, and as lecturer in Economics at the Akademie des Handwerks in Hamburg.
Since 2007 he is Assistant Professor at the Universidad de los Andes School of Management, Bogotá,
teaching Operations, Logistics, Supply Management and Value Network Management in undergraduate,
graduate, and executive programs. He also works as consultant at the Center for Strategy and Competi-
tiveness (CEC) of UniAndes School of Management.
428
About the Contributors
Bikem Turkeli is a graduate student in Marmara University, Industrial Engineering Department. She
is graduated from Işık University, Industrial Engineering Department with full scholarship. She completed
the Minor Program in Computing Systems offered by the Department of Computer Engineering. She
is graduated with Honor degree with 3.10 / 4.00 GPA. Her graduation project was about order picking
and during her study; she used Visual Basic programming language.She is now working on solving bi-
criteria open shop scheduling problem with Genetic algorithm and Tabu Search algorithm. In her thesis
study, she will develop JAVA programming language for Genetic algorithm and Tabu search algorithm
and will use this structure in open shop scheduling problem program. She did her practical trainings in
FORTIS Bank and in BSH (Bosch and Siemens Home Appliances Group) Washing Machine factory.
Masayuki Ueda was born in Sendai City (Miyagi Prefecture), Japan in 1975. He earned a bachelor’s
degree in commerce from Otaru University of commerce in 1999. And, he earned a master’s degree (2002)
and a doctor’s degree (2006) in business administration from Hokkaido University. He belonged to the
Venture Business Laboratory of Hokkaido University, where he was a part-time researcher from 2006
to 2009. He has been a part-time instructor at Sapporo University and Sapporo Gakuin University since
2007. His current research interests are focused primarily on decision support with non-mathematical
problem description. He is a member of JSPM (The Japan Society for Production Management).
Li Wenli earned her Ph. D. degree from the University of Hong Kong with an emphasis in supply
chain management. Now she works as an associate professor in Shenzhen Tourism College of Jinan
University. Her research interests cover supply chain management, revenue management, service man-
agement and service marketing.
Ye Xiang is an undergraduate student of the Shenzhen Tourism College of Jinan University. He has
participated in some R & D projects such as “‘Nan Feng Chuang” research activity, Challenge Cup in
Jinan University and Scientific and technological innovation projects. He also interested in analyses
of the present situation and the problems about logistics enterprise in China. And the eComerce is his
main research fields.
429
430
Index
Copyright © 2010, IGI Global, distributing in print or electronic forms without written permission of IGI Global is prohibited.
Index
China Overseas Logistics (COL) 22, 33, 34, data transmission 71, 72, 73, 78, 81
35, 36, 37, 38, 39, 40, 41, 42 data warehouse 128, 129, 130, 138, 139,
clearance management 38 140, 141, 142, 143
client management 39 data warehouse audit 140
Clinical Information Systems (CIS) 215, 216 DC power 98
CMOS 80 DC signal 106
CobiT 128, 136, 137 decision management 39
co-creation 46, 48 decision support 38, 157, 158, 159, 160,
code division multiple access (CDMA) 161, 162, 163, 164, 165, 166, 167,
100, 111 168, 169
collaborative SRM (cSRM) 212 Decision Support System (DSS) 129, 139, 315,
commercial off-the-shelf (COTS) 70, 71 316, 323, 332, 334
competitive situation 370 declaration management 39
Compliance Tracking 251, 267 Denial-of-service (DoS) 82, 83
Computer Aided Process Engineering (CAPE) destination 320, 322
134 detective control 299, 308
Computer Aided Software Engineering (CASE) DHL Logbook 6
134 disaggregate 315, 316, 318, 319, 320, 322,
Computerized Physician Order Entry (CPOE) 324, 327, 328, 330, 331, 332
216, 222 Distributed Sensor Networks (DSN) 66, 92
computer technology 30 distribution management 37, 38, 39
Container Terminal (CT) 315, 318, 319, distribution system 129
323, 327, 332, 333 Domain Name System (DNS) 283
continuous improvement drugs supply management 206, 216, 217, 221
173, 174, 176, 185, 186, 191 DSS 164, 169, 170
Contract Drafting 251, 265
contract management 38 E
coupling of modes (COM) 104, 109 e-cash payment system 10
CRM 51, 60, 64 e-commerce 2, 10, 16, 273, 274, 278,
cross-organizational flows 366 280, 282, 284, 289, 290, 291, 292,
curative control 299, 308, 309 293, 295, 297
customer centric 46, 47, 49, 50, 51, 52, economic volume 238, 239, 240, 241, 242
53, 54, 55, 56, 57, 58, 59, 64 EDI 38, 42, 43, 279
customer relation management 38 EDIFACT 7
customer relationship management (CRM) electronic auctions 213
208, 210, 212, 221, 222, 223, 225 Electronic Commerce (E-Commerce) 76, 77
Customer Service Representative (CSR) 308 electronic contract management 213
custom service efficiency 235 Electronic Data Interchange (EDI) 5, 6, 7,
CVC (CVV) 7 19, 20, 74, 76, 77, 118, 119, 125
Cyber Transportation Logistics (CTL) 272, Electronic Funds Transfer (EFT) 8
273, 274, 275, 284, 286, 287, 288, electronic marketplace 275
289, 290, 291, 294 Electronic Medical Record (EMR) 215
Electronic Payment Systems (EPS) 7, 10, 19
D
Electronic Product Code (EPC) 13
data exchange system 38 electronic purse 8
data link layer (DLL) 72
431
Index
432
Index
433
Index
logistics enterprise 22, 24, 28, 29, 30, 31, network topology 80
32, 34, 35, 38, 42, 43, 44 neutral agents 367
logistic services 315 noise figure (NF) 101, 107
Logistics Full Service-Provider 359, 371, 372
logistics information 113, 114, 124, 125 O
logistics management Object Naming Service (ONS) 283
37, 38, 39, 40, 42, 43, 135 one-stop place 29
logistics processes 1, 2, 18, 114, 115 on-line payment systems 10
logistics service 21, 22, 24, 25, 26, 27, 28, OOK 103, 107
29, 30, 31, 32, 33, 34, 36, 38, 43, Operating system (OS) 70
44, 359, 360, 361, 362, 363, 364, Operational Data Store (ODS) 139
365, 366, 367, 368, 369, 370, 371, Operational SRM (oSRM) 212, 213, 226
372, 374, 375 Operations Research/Management Science
Logistics Service Networks (OR/MS) 157, 158, 159, 160, 161,
359, 371, 374, 375 162, 163, 164, 165, 166, 168, 169,
logistics service providers 359, 360, 365, 170
366, 367, 368, 369, 370, 371, 375 ordinary least square (OLS) 232, 235, 238
Logistics service providers (LSP) organizational forms 359, 360, 370, 374, 375
113, 114, 118, 123, 124, 125 origin 320, 322
logistics services architecture 359 Origin-Destination (O-D) 322, 323, 324
Logistics Specialist 359, 371, 372, 373 OR/MS decision support 157, 158, 159,
Logistics System 2 160, 161, 162, 163, 164, 165, 166,
low noise amplifier(LNA) 107 168, 169
M P
Management Science 157, 158, 169, 170 P2P 10
Manufacturing Execution Systems 154 P2P3 system 10
maximum market 263 Pairwise Shift 256, 259, 260, 261
mechanical technology 30 Pairwise Swap 260
medium access control (MAC) perceived risk 299, 300, 301, 302, 303,
69, 70, 72, 73, 89, 95 307, 308, 310, 312, 313, 314
mental intangibility 162, 168, 169 performance benchmarking 230
metallurgical sector 173, 174, 184 Personal Computer Banking 9
Micro-electro-mechanical system (MEMS) 67 personal digital assistants (PDAs) 71, 87
Mid-America Transportation Center (MATC) Personal Identification Number (PIN) 7
287 Personal Protective Equipment (PPE) 177
Mobile Ad Hoc Networks (MANET) 67 personnel management 39
mobile communication technologies 123 Pharmacy Information Systems (PIS)
Mobile Harbour Crane (MHC) 324, 325 215, 217, 218, 219
MPSK 103, 107, 108 phase shift keying (PSK) 101, 102
Multiple Access with Collision Avoidance physical intangibility 162, 168, 169
(MACA) 67, 92 Point of Sale (POS) 8, 19
power electronics 144, 146, 151, 152
N
power relations 370
nanoscale electromechanical systems (NEMS) PPMIM 87
67 preventative control 299, 308
434
Index
435
Index
436
Index
437