Change search
ReferencesLink to record
Permanent link

Direct link
The risk for detection affects the logistics system setup for cargo smugglers
University of Borås, School of Engineering.
2009 (English)Conference paper (Refereed)
Abstract [en]

Purpose of this paper This paper examines the differences in logistics system design depending on the legality of the supply chains. The legality of the goods/actors is a vital factor when taking the goods from point-of-origin to the end user. This paper uses different logistics theories to provide a likely theoretical explanation of how and in what way the legality of the supply chain affects logistics system setups. Design/methodology/approach This paper takes a macro-perspective on the differences between legal and illegal logistics activities depending on the legality of supply chains. The validation of this paper is based on three different structures: theoretical frame of reference, analysis of official reports and two different cases studies. This paper uses methodology triangulation and dual perspective to describe the interaction between illegal supply chains and the legal world’s preventing efforts. The key analytical feature for this paper is the risk for detection element. Findings Several supply chains use the transport network services and therefore it is not always possible to separate legal from illegal supply chains. The illegal supply chains have a unique constraint in comparison to the legal setup: the risk for detection. The detection risk factor is one of the greatest logistics constraints on the illegal flow of goods and it is in this constraint that the professionalism of the actors is found. Research limitations/implications (if applicable) The research is based on secondary sources like official statistics and interviews with security and customs personnel. Practical implications (if applicable) The triad logistics setup provides a good theoretical foundation to understand how the legal transport network is abused by criminal businesses. This paper illustrates that a filtration of information regarding the shipped products is the primary tool to use to successfully abuse the legal transport network. What is original/value of paper This paper uses well known theories from logistics research to both describe and explain the illegal supply chains.

Place, publisher, year, edition, pages
Keyword [en]
illegal supply chain, transport system, transport network configuration, cargo smuggling, logistics system design, Supply chain risk management
National Category
Production Engineering, Human Work Science and Ergonomics
URN: urn:nbn:se:hb:diva-6299Local ID: 2320/5905OAI: diva2:886986
Nofoma 2009, Jönköping, Sverige



Available from: 2015-12-22 Created: 2015-12-22

Open Access in DiVA

fulltext(941 kB)84 downloads
File information
File name FULLTEXT01.pdfFile size 941 kBChecksum SHA-512
Type fulltextMimetype application/pdf

Search in DiVA

By author/editor
Ekwall, Daniel
By organisation
School of Engineering
Production Engineering, Human Work Science and Ergonomics

Search outside of DiVA

GoogleGoogle Scholar
Total: 84 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

Total: 20 hits
ReferencesLink to record
Permanent link

Direct link