| 研究生: |
劉哲瑋 Jer-wei Liu |
|---|---|
| 論文名稱: |
貨櫃港口之科技選擇決策模型 Decision modeling of technology selection for container security in maritime terminals |
| 指導教授: |
沈建文
Chen-weng Shen |
| 口試委員: | |
| 學位類別: |
碩士 Master |
| 系所名稱: |
管理學院 - 企業管理學系在職專班 Executive Master of Business Administration |
| 畢業學年度: | 100 |
| 語文別: | 英文 |
| 論文頁數: | 82 |
| 中文關鍵詞: | 轉口流程 、決策分析 、貨櫃安全 、影響圖 |
| 外文關鍵詞: | Decision-making, Influence diagram, Transshipment, Container security |
| 相關次數: | 點閱:18 下載:0 |
| 分享至: |
| 查詢本校圖書館目錄 查詢臺灣博碩士論文知識加值系統 勘誤回報 |
從911事件之後,為了加強貨櫃運輸的安全,政府機構和民間組織設立了許多新的安全規範。雖然遵從這些安全規範可以強化貨櫃安全,但也會降低港口的作業效率。藉由導入ICT解決方案,港口能夠增加本身的安全性並且加快貨櫃運送的流程。然而對於港口的管理者來說,考慮到港口作業流程的複雜度和ICT的多樣性,選擇出適合港口的ICT解決方案是一件困難的事情。
本研究利用影響圖等相關方法,建立了一個多目標決策模型以協助港口管理者選擇最適合港口的ICT解決方案,以提升港口轉口流程的安全性。此決策模型不僅可以考量到不確定因素的影響和決策者的風險態度,並能配合各港口的作業策略與決策者偏好,綜合衡量安全性、作業效率喊建置成本等目標,計算出各解決方案的效用值,依此來推論出對於港口的最佳選擇。最後,本研究利用一個案來驗證決策模型的實用性,並透過敏感度分析測試模型的穩定性。
Since the terrorist attacks on the United States on September 11th 2001, many government initiatives, regulations and mandates have introduced new requirements for container security. Implementation of information technology could help container terminal to achieve required security improvement. However, selecting suitable technology solutions is a challenging task for port authority because port processes are complicated and technological alternatives are divergent.
In this paper, a decision-making framework for evaluating technology solution alternatives for transshipment processes in maritime terminals was developed. The objective of this framework is to provide an approach for decision makers to select an optimal technology solution for security improvement in container terminal with respect to the operational strategies of port authority. This approach consists of a multistage influence diagram modeling the terminal’s sequential technology selection decisions. The influence diagram graphically describes the elements of the decision process and takes into account the preferences of decision makers under conditions of uncertainty. The solution procedure of framework is illustrated with a case study and a sensitivity analysis is performed to test the robustness of the decision model.
Abajo, V., O. (2009). Analysis of ICT solutions integration for tracking purposes in container terminal management and operation (Master''s thesis). Retrieved from http://upcommons.upc.edu/pfc/handle/2099.1/7867
Anonymous (2003). Why does the market need GPS tracking? Retrieved from http://www.logjobs.com/content.php3?file=mobileapplications.html
Anonymous (2002a). PAR logistics and Savi team up to improve cargo container security. Retrieved from http://www.eyefortransport.com/print.asp?news=34025
Anonymous (2002b). GPS brings real time tracking to Australian logistics. Retrieved from http://www.spacedaily.com/news/gps-02n.html
Anonymous (200c2). James Brown trucking equip 1000 trailers with vistar tracking solution. Retrieved from http://www.eyefortransport.com/print.asp?news=31179
Bagchi, U., Guiffrida, A., O’Neill, L., Zeng, A., Hayya, J. (2007). The effect of RFID on inventory management and control. Springer Series in Advanced Manufacturing, London, England: Springer.
Barro-Torres, S., J., Fernandez-Carames, T., M., Gonzalez-Lopez, M. & Escudero-Cascon, C., J. (2010). Maritime freight container management system using RFID. The Third International EURASIP on RFID Technology, 93-96.
Bhatti, T. (2000). Justification of manufacturing technology capital investment: an intergrated approach. Proceedings of the IEEE International Conference on Management of Innovation and Technology, Singapore, 346-353.
Bernasek, A. (2002, Feburary). The Friction Economy American business just got the bill for the terrorist attacks: $151 billion a year. Fortune. Retrieved from http://money.cnn.com/magazines/fortune/fortune_archive/2002/02/18/318153/index.htm
CBP. (2006). Container Security Initiative: 2006-2011 strategic plan. Retrieved from http://epic.org/privacy/surveillance/spotlight/1006/csiplan.pdf
CBP. (2007). Customs-Trade Partnership Against Terrorism strategic plan. Retrieved from http://www.cbp.gov/linkhandler/cgov/trade/cargo_security/ctpat/ctpat_program_information/what_is_ctpat/ctpat_strat_plan.ctt/ctpat_strat_plan.pdf
City of Yokohama - Port and Harbor Bureau. (2010). Port & Harbor plan – Port of Yokohama. Retrieved from http://www.city.yokohama.lg.jp/kowan/english/pdf/portharborplan.pdf
Chan, F., T., S., Chan, M., H., & Tang, N., K., H. (2000). Evaluation methodologies for technology selection. Journal of Materials Processing Technology, 107, 330-337.
Chan F. T. S. (2003). Performance measurement in a supply chain. The international journal of advanced manufacturing technology, 21, 534-538.
Chappel, G., Durdan, D., Gilbert, G., Ginsburg, L., Smith, J., & Tobolski, J. (2003). Auto-ID on delivery: the value of Auto-ID technology in the retail supply chain. Technical Report, Auto-ID center.
Clemen, R. T. & Reilly, T. (2001). Making hard decisions with decision tools.
Pacific Grove, Central America: Duxbury/Thomson Learning.
Daschkovska, K., & Scholz-Reiter, B. (2008). Electronic Seals for Efficient Container Logistics. Dynamics in Logistics, 305-312.
Daschkovska, K., & Scholz-Reiter, B. (2011) How can Electronic Seals Contribute to the Efficiency of Global Container System. Dynamics in Logistics, 6, 457-467
Dutta, A., Lee, H., Whang, S., (2007). RFID and operations management: technology, value, and incentives. Production and Operations Management, 16(5), 646-655
Edosomwan, A., E. (1989). Integrating innovation and technology management. Wiley, New York.
Farre Barbera, J. (2009). Modeling processes in the operation of an automated container terminal. (Master’s thesis). Retrieved from http://upcommons.upc.edu/pfc/handle/2099.1/6680
Gaukler, G., M. (2005). RFID in supply chain management (Doctor’s thesis). Availabe from ProQuest Dissertation and theses database. (UMI No. 3187292)
Gaukler, G. M., Seifert, R. W., (2007). Application of RFID in supply chain. Springer Series in Advanced Manufacturing, London, England: Springer.
Glickman, T. & White, S. (2006). Security, visibility and resilience: the keys to mitigating supply chain vulnerabilities. International Journal of Logistics Systems and Management, 2(3), 107-119.
Griffiths, J., L., Phelan, A., Osman, K., A., & Furness, A. (2007). Using item-attendant information and communications technologies to improve supply chain visibility. Agile Manufacturing, ICAM 2007, 9-11.
Gobel, C. & Gunther, O. (2009). The value of visibility and RFID in transshipment operations – a simulation study. Wirtschaftinformatik Proceeding 2009, 129-138.
Gui, Z. & Xie, P. (2010). RTK GPS enhanced reliability for automatic container terminal. Progress in Informatics and Computing (PIC), 2(4), 1199-1202.
Handfield, R., Walton, S. V., Sroufe, R. & Melnyk, S. A. (2002). Applying environmental criteria to supplier assessment: A study in the application of the Analytical Hierarchy Process. European Journal of Operational Research, 141(2), 70-87.
Hayashi, K. (2007). An e-Seal in Container Security Program: How to maximize the benefits of e-Seal in the battle against terrorism(Master''s thesis). Retrieved from http://rfid-a-gogo.cocolog-nifty.com/Koichiro_Hayashi_Thesis.pdf
Jones, E. C. & Chung, C. A. (2008). RFID in logistics: a practical introduction. Taylor & Francis Group, LLC.
KaErkkaEinen, M. (2003). Increasing efficiency in the supply chain for short shelf life goods using RFID tagging. International Journal of Retail and Distribution Management, 31(10), 529–536.
Lai, C. T. (2010). E-seal system design and benefits evaluation for global container transport security (Master’s thesis). Retrieved from http://pc01.lib.ntust.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0608111-162606
Lee, H. & Ozer, O. (2009). Unlocking the value of RFID. Production and Operations Management, 16(3), 40-64.
Li, S., Visich, J. K., Khumawala, B. M., Zhang, C. (2006). Radio frequency identification technology: applications, technical challenges and strategies. Sensor Review, 26(10), 193-202.
Liu, S., S. (2009). The Critical Success Factors for RFID System Implementation---A Case study on Kaohsiung Harbor Electronic Seal System (Master''s thesis). Retrieved from http://repository.nkfust.edu.tw/ir/handle/987654321/5277
Lu, C. S. & Yang, C. S. (2010). Safety leadership and safety behavior in container terminal operations. Safety science, 48(2), 123-134.
Kim, D. K., Lee, M., Kang, Y. S., Chung, S., Yoon, W., Min, J. & Kim, H. (2007). Design and performance analysis of electronic seal protection systems based on AES. ETRI Journal, 29(6), 755-768.
Kim S., J., Deng G., Gupta S., K., S., & Hoye, M. M. (2008). Enhancing cargo container security during transportation: A mesh networking based approach. Paper presented at Technologies for Homeland Security, 2008 IEEE Conference, Waltham, MA.
Khouja, M. (1995). The use of data envelopment analysis for technology selection. Compters and Industrial Engineering, 28(3), 123-132.
Kwek, K. H., & Goswami, N. (2004). Cost and productivity implications of increased security in sea trade processes. The Logistics Institute-Asia-Pacific, National University of Singapore.
Maspero, E., Van Dyk, E., & Ittmann, H. (2008). Maritime supply chain security: navigating through a sea of compliance requirements. Journal of Transport and Supply Chain Management, 2(1), 12-14.
McCormack, E., Jensen, M., Hovde, A. (2008). Evaluating the Use of Electronic Door Seals (E-Seals) on Shipping Containers. International Journal of Applied Logistics, 1(4), 17-34.
Min, J.U., Park, M. (2007). Electronic cargo seal for safe and secure supply chain traceability. Journal of international logistics and trade, 5(1), 47-56.
Mullen, D. (2004).The application of RFID technology in a Port. Port Technology International, 22, 181–182.
Ngai, E.W.T., Cheng, T.C.E, Au, S., & Lai, Kee-hung (2007, February). Mobile commerce integrated with RFID technology in a container depot. Decision Support Systems, 43(1), 62-76.
European Conference of Ministers of Transport (2005). Container Transport Security Across Modes. :OECD Publishing.
Panagopoulos, N. (2007). Analyzing the use of radio frequency identification (RFID) on the container industry (Master''s thesis). Retrieved from http://hdl.handle.net/1721.1/39884
Patterson, A., Kirk, Grimm, M., Curtis, & Corsi, M., Thomas (2003). Adopting new technologies for supply chain management. Transportation Research Part E: Logistics and Transportation Review, 39, 95-121.
Peleg-Gillai, B., Bhat G. & Sept, L. (2006). Innovators in supply chain security – better security drives business value. The Manufacturing Innovation Series, Stanford University – The Manufacturing Institute.
Peterson, J. & Treat, A. (2008). The post 9/11 global framework for cargo security. USITC Journal of International Commerce and Economics, 3, 1-30.
Punniyamoorthy, M. & Ragavan, P. (2003). A strategic decision model for the justification of technology selection. The International Journal of Advanced Manufacturing Technology, 21, 72-78.
Ramanathan, R. (2001). A note on the use of the analytic hierarchy process for environmental impact assessment. Journal of Environmental Management, 63, 27-35.
Reidy S. & Redbro M. (2007). Envisioning an efficient and secure global supply chain, IBM Global Business Services, February 2007.
Rosenbloom, E. S. (1996). A probabilistic interpretation of the final rankings in AHP. European Journal of Operational Research, 96, 371-378
Shachter, R. D. (1986). Evaluating influence diagrams. Operations Research, 33(6), 871-882.
Shehabuddeen, N., Probert, D. & Phaal, R. (2006). From theory to practice: challenges in operationalising a technology framework. Technovation, 26, 324-335.
Siror, J., K., Liang., G., Pang, K., Sheng, H. & Wang, D. (2010). Use of RFID for intelligent pre-shipment inspection. Journal of Convergence Information Technology, 5(9), 190-199.
Steenken, D., Vos, S. & Stahlbock, R. (2004). Container terminal operation and operations research – a classification and literature review. OR Spectrum, 26(1), 3-49.
Tataman, J. A. & Shachter R. D. (1990). Dynamic programming and influence diagrams. IEEE Transactions on Systems, Man, and Cybernetics, 20(2), 365-379.
Theiss, A., Yen, D., C. & Ku, C. (2005). Global Positioning Systems: an analysis of applications, current development and future implementations. Computer Standards & Interfaces, 27(2), 89-100.
Thonemann, U. W., (2002). Improving supply-chain performance by sharing advance demand information. European Journal of Operational Research, 142(2), 81-107
Tsai, M. (2006). Constructing a logistics tracking system for preventing smuggling risk of transit containers. Transportation Research Part A: Policy and Practice, 40(6), 526-536.
Unisys corp. (2007). An evaluation of the economics of trade security enhancement via the Smart and Secure Trade Lanes (SST) initiative. APEC Security Trade Project Final Report, Retrieved from http://www.apec-tptwg.org.cn/new/Projects/APEC%20Final%20Report%20vFINAL.pdf
Urciuoli, L. (2010). Supply chain security – mitigation measures and a logistics multi-layered framework. Journal of Transportation Security, 3(4), 1-28.
Van Oosterhout, M., P., A., Veenstra, A., W., Meijer, M., A., G., Popal, N. & Van den Berg, J. (2007). Visibility Platforms for Enhancing Supply Chain Security: a Case Study in the Port of Rotterdam. Proceedings of the International Symposium on Maritime Safety, Security and Environmental Protection, Athens, 20-21.
Whitaker, J., Mithas, S., Krishnan, M. S., (2007). A field study of RFID deployment and return expectations. Production and Operations Management, 16(5), 599-612.
Yixiu, Z. (2008). Benefit analysis of IT visibility platforms in containerized supply chains (Master thesis). Retrieved from http://www.transumofootprint.nl/upload/documents/03%20Projecten/Beveiliging%20in%20de%20logistieke%20keten/03%20Output/05%20Rapporten,%20notities,%20verslagen/rapportage%20informatie%20analysie%20II.pdf