Title Page
Contents
Korean Abstract 8
Abstract 10
Chapter 1. Introduction 12
Chapter 2. Supply Chain Security System 19
2.1. Maritime Security Initiatives 19
2.1.1. C-TPAT(Customer-Trade Partnership against Terrorism) 19
2.1.2. Container Security Initiative (CSI: agreement on container security) 20
2.1.3. Authorized Economic Operator (AEO) 21
2.2. Supply Chain Security Management Framework 22
2.3. Literature Review 24
2.3.1. Review on maritime security 24
2.3.2. Review on maritime security (Korean material) 25
2.3.3. Review on security technology 26
2.3.4. Analytic Hierarchy Process 26
Chapter 3. Designing the Framework for an Evaluation of Supply Chain Security 28
3.1. Framework Modeling 28
3.2. Data Collection 30
Chapter 4. Evaluating the Supply Chain Security of Incheon Port 34
4.1. Analyzing the Importance of the Security Categories(Level 1) 34
4.2. Analyzing the Importance of the Security Items(Level 2) 38
4.3. Evaluating the Preparation Level for the Security System using the Likert Scale. 42
4.3.1. Facility protection 46
4.3.2. Physical access control 47
4.3.3. Container inspection, storage and seals 50
4.3.4. Cargo procedural and conveyance security 52
4.3.5. Cargo inspection and tracing 55
4.3.6. Personnel security 57
4.3.7. Security training/program 59
4.3.8. Crisis management and disaster recovery & self assessment 60
4.3.9. Collaboration with authorities and business partners 62
4.3.10. Computer system security 64
4.4. Analyzing the Result Values after Applying Weight (Status of Maritime Security System Preparation on Worksite) to the Importance of Items (Level 2) 66
4.4.1. Analyzing the result value of worksite groups (maritime transporters and container terminals) (Self Assessment) 67
4.4.2. Analyzing the result value of expert groups (Expert Assessment) 70
4.5. Implication 72
Chapter 5. Conclusion 75
5.1. Research Summary 75
5.2. Limits 77
Reference 79
Table 1. The effects of supply chain security 14
Table 2/4. The maritime security system in international logistics 14
Table 3. The three level benefits of C-TPAT 17
Table 4. The security regulations and subjects of C-TPAT policy in 19
Table 5. Details of CSI. system 20
Table 6. Subjects and security standards of WCO SAFE Framework 21
Table 7. Elements and details of the supply chain security management 23
Table 8. Elements and details of the framework 29
Table 9. Number of participants in interview 32
Table 10. The number of participants and surveyor 33
Table 11/9. Importance level for each group 34
Table 12. The importance of items (Experts) 38
Table 13. The importance of items (Maritime transporters) 39
Table 14. The importance of items (Container terminals) 40
Table 17. Survey Result of Maritime Security (Maritime transporters) (1) 43
Table 16. Survey Result of Maritime Security (Container Terminal) (1) 43
Table 17. Survey Result of Maritime Security (Maritime transporters) (2) 44
Table 18. Survey Result of Maritime Security (Container Terminal) (2) 44
Table 19. Security for maritime transporters/container terminals 46
Table 20. Security for maritime transporters 47
Table 21. Security for container terminals 48
Table 22. Security for maritime transporters 50
Table 23. Security for container terminals 50
Table 24. Security for maritime transporters 52
Table 25. Security for container terminals 53
Table 26. Security for maritime transporters/container terminals 55
Table 27. Installation status for fixed-type container inspection devices 57
Table 28. Security for maritime transporters 57
Table 29. Security for container terminals 58
Table 30. Security for maritime transporters 59
Table 31. Security for container terminals 59
Table 32. Security for maritime transporters/container terminals 60
Table 32. Security for maritime transporters 62
Table 34. Security for container terminals 63
Table 35. Security for maritime transporters 64
Table 36. Security for container terminals 65
Table 38. Result of analyzing maritime transporters 67
Table 39. Result of analyzing container terminals 68
Table 42. Result of analyzing maritime transporters 70
Table 43. Result of analyzing container terminals 71
Figure 1. Supply Chain Security Management 22
Figure 2. Hierarchical structure model of the evaluating 28
Figure 3. The range of each security system 31
Figure 4. Distribution of importance level for each group 36
Figure 5. Distribution of importance level for each group 36
Figure 6. Distribution of importance level for each group 37
Figure 7. Distribution of importance level for each group 37
Figure 8. Evaluation score of Maritime Security(1) 43
Figure 9. Evaluation score of Maritime Security(2) 45