SlideShare uma empresa Scribd logo
1 de 51
Baixar para ler offline
When security is deployed
for the logistic industry:
ELISA, a case history


Columbia Business School - Columbia University - New York, NY
November 19 2012



                                               november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Meet ELISA:
Electronic Locking Interactive
Security Apparatus



                    november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
General Market Concepts




                  november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Quality
In business, engineering and manufacturing,
quality has a pragmatic interpretation as the
non-inferiority or superiority of something; it is
also defined as fitness for purpose.
Managing quality is fundamental to any activity and
it implies: having a clear understanding of all
related aspects, measuring performance and taking
action to improve.



                                november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
“Being sure that
 a product arrives
 safely and undamaged
 to the final customer
 is obviously an aspect
 of its quality”




                          november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Customer satisfaction
a measure of how products and services supplied by
a company meet or surpass customer expectation.
In a competitive marketplace - where businesses
compete for customers - customer satisfaction is
seen as a key differentiator and increasingly has
become a key element of business strategy.
It is therefore essential for businesses to effectively
manage customer satisfaction.



                                  november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
“Making sure that a
 product arrives safely
 and undamaged
 to the final customer
 is obviously closely tied
 to that customer’s
 satisfaction!”




                             november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Cost optimization

    Adjusting a/all process/es so as to optimize some
    specified set of parameters without violating some
!
    constraint is known as process optimization.
!
!
!


The most common benefits which derive
from a successful optimization are: minimizing cost,
maximizing throughput and/or efficiency.



                                   november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
“Making sure that all processes
 used to assure that the product
 arrives safely to the final customer
 are the best possible,
 obviously results into a more
 fluid and cost-effective system,
 one which gives the manufacturer
 better quality and higher
 customer satisfaction
 (and one that, therefore, can
 improve the company’s standing
 in the market)”

                                  november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Specific Keywords (or Concepts)




                    november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Security:
The degree of protection necessary to safeguard
something (or someone) against danger, damage,
loss, and crime. As a form of protection it includes
all structures and processes that provide or
improve security as a condition.
It also implies a condition in which one becomes
AWARE of the possibility that, in its development, a
system can evolve into some unwanted states.



                                 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Risk:
The Oxford English Dictionary defines risk as the:
(Exposure to) the possibility of loss, injury, or other
adverse or unwelcome circumstance; a chance or
situation involving such a possibility.
Risk is therefore the potential that a chosen ac-
tion or activity (including the choice of inaction)
will lead to a loss (an undesirable outcome).
The notion implies that a choice having an
influence on the outcome exists (or existed).


                                    november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Analysis:
The process of breaking a complex topic or
substance into smaller parts, to gain a better
understanding of it.!


Analysis, in business, is a fundamental step to
identify needs so that solutions can be devised
and implemented. It involves the study of the
activity conducted and of all relative statistics,
environment, procedures, workforce, risks and
other pertinent aspects, with the objective of
producing an assessment of the situation.

                                  november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Management:
 All the activities put in place when conducting an
 activity. Proper management includes procedures
 for all possible stages of the activity: normal as
 well as critical. In the area of security, proper
 management implies devising:
•  preventive measures (actions put in place to
   prevent the event of a possible risk)
•  protective measures (actions put in place to
   protect people and goods in the case of an
   hazard)

                                 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Risk!Analysis!
The cycle of security                    knowledge!&!awareness          !



                                   Risk!
                             Assessment!
                             balance!&!selec6on!




                                                Risk!
                                          Management!
                                           ac6on!&!measure!




                    november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Both awareness and prior knowledge are to be
considered a method as well as an objective and as
such they require an holistic approach, considering
the interdisciplinary and the global issues related
to the subject of security.




                                november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Security deployed for logistics




                     november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
the landscape
Globalization and the consequent aperture of new
markets requires that companies face new and
bigger challenges, to answer with quality and
efficiency to client’s needs, especially in terms of
flexibility, cost optimization and attention to the
environment.




                                november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
This has required, in the last decade, a continuous
push for innovation in industrial strategies, in the
organization of the operational processes and in
system management.
!
!
!
!


    Obviously, these development involve the field
    of logistics - as well as the supply chain infrastruc-
    tures and the systems used to manage them - which
    has also evolved to cater to the progressive
    demand for new solutions and new approaches.



                                      november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Logistic processes, thus, have grown and have been
implemented with a series of technical and
organizational optimizations, well supported by a
technology that is increasingly becoming more
efficient and cost-effective.




                                november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Nonetheless, to date, little attention (aside from
the insurance point of view) has been placed on the
aspects that relate to the industrial security of
logistic processes and to its components.
!
!
!
!


Failing to acknowledge the consequences of such
oversight can heavily impact - in terms of quality as
well as of economical and financial implications - on
the business.



                                 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Such consequences are readily accessible in daily
news: property, information, equipment, supplies,
personal belongings or intangible data, all can be
stolen or damaged and the weakest link in the
supply chain is the process that takes a product
from the manufacturer to the consumer is the road
the product rides to reach the final user.




                                november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
It is not easy, in fact, to monitor effectively the
    entire path the goods travel to go from point A to
!
    point B, primarily for two reasons:
!
!
!


•  part of this process (like transportation or stock-
   age) is often assigned to third-party providers

•  consequences of damaging acts by internal
   employees are considered more important than
   those perpetrated by other people, outside the
   company.


                                      november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Logistics operators are obviously the ones primarily
    affected by the “holes” in these processes, as they
    are responsible for stocking and moving the goods
!
    from one step to the next in the supply chain.
!
!
!


There are no certain statistics, although some
researches quantify the security issue in a value
that goes from the 0,5% to the 1% of gross
income.




                                    november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
DHL has declared that, only in Europe, over 8 billion
Euros in value of high added-value goods are
stolen each year.
!
!
!
!


Not to mention the damage derived by the loss in
image by the company.




                                 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
In such a complex and ever-changing environment
    the primary efforts need be focused on developing
    integrated products and services at an accessible
!
    cost, characterized by innovative high technologies.
!
!
!


The challenge?
Delivering dynamic and sustainable answers to the
ever-changing needs of logistics operators in the
secure management of the supply chain.



                                     november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
ELISA: the project




                     november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
In this landscape, therefore, the need to rethink
!
    the various processes involved appeared evident.
!
!
!


We chose to approach the issues with a
methodological approach that implied the
following, consequential activities:




                                    november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
•  Risk Analisys - to identify vulnerabilities, the
   probabilities of happening and the type of
   dangers and liabilities;
•  Risk Assessment - with the aim of balancing
   risks and actions and of selecting the best and
   more opportune interventions;
•  Risk Management - to apply the appropriate
   procedures and the best methodologies of
   management;



                                   november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
the risks
The analysis of the activities implemented in
the entire logistic path evidenced how the security
 risk is directly tied to the increased incidence of
 certain factors:
•  poorly controlled (or controllable) fluxes;
•  increasingly small dimensions of products/goods;
•  high added-value of products/goods;
•  recyclability of products.



                                 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
the assessment

The evaluation of the elements of risk allowed for
the definition of a solution based upon an
innovative Integrated Security Model founded on
a systemic base rather than on a technological
premise.




                                 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
The system is built on a IOT (Internet of Things)
platform that can offer at any time, through ITS
(Intelligent Transportation Systems) and ALS
(Advanced Logistic Services) solutions to assure the
automatic traceability and recoverability of goods
and products along the entire supply chain




                                 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
This allows Logistic Operators to monitor without
interruptions and in real-time the path followed by
the goods, the resources and the premises/
facilities, regardless of their location.
!
!
!
!


    Obviously, this increases significantly the
    operative efficiency and the level of protection
    applied to the assets, allowing for more secure
    supply chains



                                     november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Furthermore, these solutions address and resolve
also, amongst others, some important issues
related to the safety of the products:
•  by preventing or deterring counterfeiting and
   tampering; and
•  by assuring the conformity of transportation
   and stocking with the most different legal
   requirements



                                november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
the solution: ELISA
 An “intelligent transportation unit” made up by:
•  a container, fit for logistic transportation;
•  an integrated “smart” closing device.
!
!
!
!


    The system is completed by the capability of an
    interactive connection with a Central Management
    Platform.




                                   november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
ELISA: the Apparatus




                       november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
the innovative container
ELISA’s peculiarly die-cut cardboard container
(subject also to a specific industrial patent) allows
for a perfect homogeneity and geometric
continuity which guarantees for excellent anti-
burglary protection, while maintaining an elevated
ergonomic quality and an equally high
manageability.




                                 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
the ”smart” closure

ELISA’s particular container is associated to a
specially designed smart closing device.




                                  november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Structurally, the closing device is composed of two
elements of closure made of biodegradable plastic,
one of which is immovably connected with
the internal closing flap of the container. The other
element is actively operative on the external
closing flap.
!
!
!
!


The internal locking element is predisposed to
accommodate different types (and levels) of
technology, according to the operative requirements



                                 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
The innovative structural characteristic of ELISA’s
    closing system is the perfect integration of
    different technological devices with the internal
!
    locking element.
!
!
!


This way, once closed, the container becomes
“self-protecting”.




                                      november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
technological add-ons
The closing system can be integrated with scalable
technological devices which can modularly add
functionalities such as:
•  simple identification and space-time localization
   through R.F.I.D. (Radio Frequency Identification),
•  sophisticated functions of security, control and
   monitoring through ITS (Intelligent Transportation
   Systems), ALS (Advanced Logistic Services) and
   GPS (Global Positioning System)


                                  november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
connectivity

ELISA can exchange data and information with
a remote Management & Control Platform
through diverse standards of communication,
such as N.F (Near Field Comunication), GSM/
           .C.
GPRS or satellite.




                               november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
adaptability

The innovative functional characteristic of ELISA’s
closing system is its dynamic adaptability to any
requirement/need that may be opportune in
different situations for each parcel.




                                 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Summary of functionalities




                   november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Thanks to its innovative concepts and inventions,
!
    ELISA allows for:
!


-  monitoring the packing activity with respect to
   the “picking list” of the order, memorizing the
   qualitative and quantitative data that refers to
   the nature and/or the quantity of the goods held
   by the container




                                     november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
-  automate and optimize the different
   management and control processes on the entire
!
   logistic path of the supply chain, including:
    •  traceability of the goods;
    •  correct loading sequence on the different
       vectors;
    •  stock management and warehouse
       restocking;
    •  automatic detection of attempted forceful
       opening or tampering of container;



                                 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
•  automatic detection of attempted theft or
   concealment of the entire package;
•  control of the conformity of transportation/
   stocking of goods to ensure the respect of the
   required legal parameters and procedures
   (through the monitoring of the environmental
   characteristics detectable inside and outside
   the container);
•  permanent connection with a Management &
   Control Center, to exchange data and collect
   information in real time.


                              november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
ELISA is based on an industrial patent, conferred
with a high level of innovation and inventiveness
which, do date, is extended over Europe, USA and
Canada.




                                november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Conclusions




              november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
ELISA represents a good example of a new and
innovative approach to security in the logistics
context.
!
!
!
!


Through a rigorous scientific, technological and
managerial approach, this system can guarantee
operators in the field of logistics the utmost
technical compatibility for every shipment and,
from an economical point of view the best adapt-
ability for most types of transportation needs.



                                 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Thank you for your attention
(and patience with the language)

Contacts:
s.orsenigo@cleverthinkingllc.com
@StefanoOrsenigo




                                   november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo

Mais conteúdo relacionado

Semelhante a Presentation at Columbia University of ELISA security device

Project risk management_in_new_product_development
Project risk management_in_new_product_developmentProject risk management_in_new_product_development
Project risk management_in_new_product_development
Omid Aminzadeh Gohari
 
Citizen act memo_risk_management_va
Citizen act memo_risk_management_vaCitizen act memo_risk_management_va
Citizen act memo_risk_management_va
CITIZEN ACT
 
Assessment 3 - Project Report _Template (2).docx
Assessment 3 - Project Report _Template (2).docxAssessment 3 - Project Report _Template (2).docx
Assessment 3 - Project Report _Template (2).docx
LankaniPerera
 
Stock Market Analysis and Commentary for WE June 23 2023.pptx
Stock Market Analysis and Commentary for WE June 23 2023.pptxStock Market Analysis and Commentary for WE June 23 2023.pptx
Stock Market Analysis and Commentary for WE June 23 2023.pptx
paul young cpa, cga
 
Why both the Private and Public Sectors need mandatory audits of Crisis and R...
Why both the Private and Public Sectors need mandatory audits of Crisis and R...Why both the Private and Public Sectors need mandatory audits of Crisis and R...
Why both the Private and Public Sectors need mandatory audits of Crisis and R...
paul young cpa, cga
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
Tam Nguyen
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
SelectedPresentations
 

Semelhante a Presentation at Columbia University of ELISA security device (20)

Area Development in Times of Crisis.
Area Development in Times of Crisis.Area Development in Times of Crisis.
Area Development in Times of Crisis.
 
TheKharkovians
TheKharkoviansTheKharkovians
TheKharkovians
 
2013 csi interchange_pietro_leo - ex
2013 csi interchange_pietro_leo - ex2013 csi interchange_pietro_leo - ex
2013 csi interchange_pietro_leo - ex
 
Project risk management_in_new_product_development
Project risk management_in_new_product_developmentProject risk management_in_new_product_development
Project risk management_in_new_product_development
 
Project risk management in new product development
Project risk management in new product developmentProject risk management in new product development
Project risk management in new product development
 
Citizen act memo_risk_management_va
Citizen act memo_risk_management_vaCitizen act memo_risk_management_va
Citizen act memo_risk_management_va
 
Assessment 3 - Project Report _Template (2).docx
Assessment 3 - Project Report _Template (2).docxAssessment 3 - Project Report _Template (2).docx
Assessment 3 - Project Report _Template (2).docx
 
Path Forward for all levels of Government (Public Sector)
Path Forward for all levels of Government (Public Sector)Path Forward for all levels of Government (Public Sector)
Path Forward for all levels of Government (Public Sector)
 
OPERATION MANAGEMENT FIREHUN.pdf
OPERATION MANAGEMENT FIREHUN.pdfOPERATION MANAGEMENT FIREHUN.pdf
OPERATION MANAGEMENT FIREHUN.pdf
 
Stock Market Analysis and Commentary for WE June 23 2023.pptx
Stock Market Analysis and Commentary for WE June 23 2023.pptxStock Market Analysis and Commentary for WE June 23 2023.pptx
Stock Market Analysis and Commentary for WE June 23 2023.pptx
 
Asis social innovation risk management
Asis social innovation risk managementAsis social innovation risk management
Asis social innovation risk management
 
ASIS - social innovation risk management
ASIS - social innovation risk managementASIS - social innovation risk management
ASIS - social innovation risk management
 
978285452340_11.pptx
978285452340_11.pptx978285452340_11.pptx
978285452340_11.pptx
 
UL Product Mindset 2013
UL Product Mindset 2013UL Product Mindset 2013
UL Product Mindset 2013
 
Why both the Private and Public Sectors need mandatory audits of Crisis and R...
Why both the Private and Public Sectors need mandatory audits of Crisis and R...Why both the Private and Public Sectors need mandatory audits of Crisis and R...
Why both the Private and Public Sectors need mandatory audits of Crisis and R...
 
cybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sectorcybersecurity strategy planning in the banking sector
cybersecurity strategy planning in the banking sector
 
OPERATION MGT CH-1(1).pdf
OPERATION MGT CH-1(1).pdfOPERATION MGT CH-1(1).pdf
OPERATION MGT CH-1(1).pdf
 
Web 2.0 Opportunities and Risks
Web 2.0 Opportunities and RisksWeb 2.0 Opportunities and Risks
Web 2.0 Opportunities and Risks
 
2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study2013-ISC2-Global-Information-Security-Workforce-Study
2013-ISC2-Global-Information-Security-Workforce-Study
 
Prof m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - finalProf m01-2013 global information security workforce study - final
Prof m01-2013 global information security workforce study - final
 

Último

Último (20)

Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

Presentation at Columbia University of ELISA security device

  • 1. When security is deployed for the logistic industry: ELISA, a case history Columbia Business School - Columbia University - New York, NY November 19 2012 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 2. Meet ELISA: Electronic Locking Interactive Security Apparatus november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 3. General Market Concepts november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 4. Quality In business, engineering and manufacturing, quality has a pragmatic interpretation as the non-inferiority or superiority of something; it is also defined as fitness for purpose. Managing quality is fundamental to any activity and it implies: having a clear understanding of all related aspects, measuring performance and taking action to improve. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 5. “Being sure that a product arrives safely and undamaged to the final customer is obviously an aspect of its quality” november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 6. Customer satisfaction a measure of how products and services supplied by a company meet or surpass customer expectation. In a competitive marketplace - where businesses compete for customers - customer satisfaction is seen as a key differentiator and increasingly has become a key element of business strategy. It is therefore essential for businesses to effectively manage customer satisfaction. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 7. “Making sure that a product arrives safely and undamaged to the final customer is obviously closely tied to that customer’s satisfaction!” november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 8. Cost optimization Adjusting a/all process/es so as to optimize some specified set of parameters without violating some ! constraint is known as process optimization. ! ! ! The most common benefits which derive from a successful optimization are: minimizing cost, maximizing throughput and/or efficiency. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 9. “Making sure that all processes used to assure that the product arrives safely to the final customer are the best possible, obviously results into a more fluid and cost-effective system, one which gives the manufacturer better quality and higher customer satisfaction (and one that, therefore, can improve the company’s standing in the market)” november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 10. Specific Keywords (or Concepts) november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 11. Security: The degree of protection necessary to safeguard something (or someone) against danger, damage, loss, and crime. As a form of protection it includes all structures and processes that provide or improve security as a condition. It also implies a condition in which one becomes AWARE of the possibility that, in its development, a system can evolve into some unwanted states. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 12. Risk: The Oxford English Dictionary defines risk as the: (Exposure to) the possibility of loss, injury, or other adverse or unwelcome circumstance; a chance or situation involving such a possibility. Risk is therefore the potential that a chosen ac- tion or activity (including the choice of inaction) will lead to a loss (an undesirable outcome). The notion implies that a choice having an influence on the outcome exists (or existed). november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 13. Analysis: The process of breaking a complex topic or substance into smaller parts, to gain a better understanding of it.! Analysis, in business, is a fundamental step to identify needs so that solutions can be devised and implemented. It involves the study of the activity conducted and of all relative statistics, environment, procedures, workforce, risks and other pertinent aspects, with the objective of producing an assessment of the situation. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 14. Management: All the activities put in place when conducting an activity. Proper management includes procedures for all possible stages of the activity: normal as well as critical. In the area of security, proper management implies devising: •  preventive measures (actions put in place to prevent the event of a possible risk) •  protective measures (actions put in place to protect people and goods in the case of an hazard) november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 15. Risk!Analysis! The cycle of security knowledge!&!awareness ! Risk! Assessment! balance!&!selec6on! Risk! Management! ac6on!&!measure! november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 16. Both awareness and prior knowledge are to be considered a method as well as an objective and as such they require an holistic approach, considering the interdisciplinary and the global issues related to the subject of security. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 17. Security deployed for logistics november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 18. the landscape Globalization and the consequent aperture of new markets requires that companies face new and bigger challenges, to answer with quality and efficiency to client’s needs, especially in terms of flexibility, cost optimization and attention to the environment. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 19. This has required, in the last decade, a continuous push for innovation in industrial strategies, in the organization of the operational processes and in system management. ! ! ! ! Obviously, these development involve the field of logistics - as well as the supply chain infrastruc- tures and the systems used to manage them - which has also evolved to cater to the progressive demand for new solutions and new approaches. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 20. Logistic processes, thus, have grown and have been implemented with a series of technical and organizational optimizations, well supported by a technology that is increasingly becoming more efficient and cost-effective. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 21. Nonetheless, to date, little attention (aside from the insurance point of view) has been placed on the aspects that relate to the industrial security of logistic processes and to its components. ! ! ! ! Failing to acknowledge the consequences of such oversight can heavily impact - in terms of quality as well as of economical and financial implications - on the business. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 22. Such consequences are readily accessible in daily news: property, information, equipment, supplies, personal belongings or intangible data, all can be stolen or damaged and the weakest link in the supply chain is the process that takes a product from the manufacturer to the consumer is the road the product rides to reach the final user. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 23. It is not easy, in fact, to monitor effectively the entire path the goods travel to go from point A to ! point B, primarily for two reasons: ! ! ! •  part of this process (like transportation or stock- age) is often assigned to third-party providers •  consequences of damaging acts by internal employees are considered more important than those perpetrated by other people, outside the company. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 24. Logistics operators are obviously the ones primarily affected by the “holes” in these processes, as they are responsible for stocking and moving the goods ! from one step to the next in the supply chain. ! ! ! There are no certain statistics, although some researches quantify the security issue in a value that goes from the 0,5% to the 1% of gross income. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 25. DHL has declared that, only in Europe, over 8 billion Euros in value of high added-value goods are stolen each year. ! ! ! ! Not to mention the damage derived by the loss in image by the company. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 26. In such a complex and ever-changing environment the primary efforts need be focused on developing integrated products and services at an accessible ! cost, characterized by innovative high technologies. ! ! ! The challenge? Delivering dynamic and sustainable answers to the ever-changing needs of logistics operators in the secure management of the supply chain. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 27. ELISA: the project november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 28. In this landscape, therefore, the need to rethink ! the various processes involved appeared evident. ! ! ! We chose to approach the issues with a methodological approach that implied the following, consequential activities: november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 29. •  Risk Analisys - to identify vulnerabilities, the probabilities of happening and the type of dangers and liabilities; •  Risk Assessment - with the aim of balancing risks and actions and of selecting the best and more opportune interventions; •  Risk Management - to apply the appropriate procedures and the best methodologies of management; november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 30. the risks The analysis of the activities implemented in the entire logistic path evidenced how the security risk is directly tied to the increased incidence of certain factors: •  poorly controlled (or controllable) fluxes; •  increasingly small dimensions of products/goods; •  high added-value of products/goods; •  recyclability of products. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 31. the assessment The evaluation of the elements of risk allowed for the definition of a solution based upon an innovative Integrated Security Model founded on a systemic base rather than on a technological premise. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 32. The system is built on a IOT (Internet of Things) platform that can offer at any time, through ITS (Intelligent Transportation Systems) and ALS (Advanced Logistic Services) solutions to assure the automatic traceability and recoverability of goods and products along the entire supply chain november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 33. This allows Logistic Operators to monitor without interruptions and in real-time the path followed by the goods, the resources and the premises/ facilities, regardless of their location. ! ! ! ! Obviously, this increases significantly the operative efficiency and the level of protection applied to the assets, allowing for more secure supply chains november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 34. Furthermore, these solutions address and resolve also, amongst others, some important issues related to the safety of the products: •  by preventing or deterring counterfeiting and tampering; and •  by assuring the conformity of transportation and stocking with the most different legal requirements november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 35. the solution: ELISA An “intelligent transportation unit” made up by: •  a container, fit for logistic transportation; •  an integrated “smart” closing device. ! ! ! ! The system is completed by the capability of an interactive connection with a Central Management Platform. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 36. ELISA: the Apparatus november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 37. the innovative container ELISA’s peculiarly die-cut cardboard container (subject also to a specific industrial patent) allows for a perfect homogeneity and geometric continuity which guarantees for excellent anti- burglary protection, while maintaining an elevated ergonomic quality and an equally high manageability. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 38. the ”smart” closure ELISA’s particular container is associated to a specially designed smart closing device. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 39. Structurally, the closing device is composed of two elements of closure made of biodegradable plastic, one of which is immovably connected with the internal closing flap of the container. The other element is actively operative on the external closing flap. ! ! ! ! The internal locking element is predisposed to accommodate different types (and levels) of technology, according to the operative requirements november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 40. The innovative structural characteristic of ELISA’s closing system is the perfect integration of different technological devices with the internal ! locking element. ! ! ! This way, once closed, the container becomes “self-protecting”. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 41. technological add-ons The closing system can be integrated with scalable technological devices which can modularly add functionalities such as: •  simple identification and space-time localization through R.F.I.D. (Radio Frequency Identification), •  sophisticated functions of security, control and monitoring through ITS (Intelligent Transportation Systems), ALS (Advanced Logistic Services) and GPS (Global Positioning System) november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 42. connectivity ELISA can exchange data and information with a remote Management & Control Platform through diverse standards of communication, such as N.F (Near Field Comunication), GSM/ .C. GPRS or satellite. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 43. adaptability The innovative functional characteristic of ELISA’s closing system is its dynamic adaptability to any requirement/need that may be opportune in different situations for each parcel. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 44. Summary of functionalities november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 45. Thanks to its innovative concepts and inventions, ! ELISA allows for: ! -  monitoring the packing activity with respect to the “picking list” of the order, memorizing the qualitative and quantitative data that refers to the nature and/or the quantity of the goods held by the container november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 46. -  automate and optimize the different management and control processes on the entire ! logistic path of the supply chain, including: •  traceability of the goods; •  correct loading sequence on the different vectors; •  stock management and warehouse restocking; •  automatic detection of attempted forceful opening or tampering of container; november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 47. •  automatic detection of attempted theft or concealment of the entire package; •  control of the conformity of transportation/ stocking of goods to ensure the respect of the required legal parameters and procedures (through the monitoring of the environmental characteristics detectable inside and outside the container); •  permanent connection with a Management & Control Center, to exchange data and collect information in real time. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 48. ELISA is based on an industrial patent, conferred with a high level of innovation and inventiveness which, do date, is extended over Europe, USA and Canada. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 49. Conclusions november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 50. ELISA represents a good example of a new and innovative approach to security in the logistics context. ! ! ! ! Through a rigorous scientific, technological and managerial approach, this system can guarantee operators in the field of logistics the utmost technical compatibility for every shipment and, from an economical point of view the best adapt- ability for most types of transportation needs. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  • 51. Thank you for your attention (and patience with the language)  Contacts: s.orsenigo@cleverthinkingllc.com @StefanoOrsenigo november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo