Presentation at Columbia University of ELISA security device

51
When security is deployed for the logistic industry: ELISA, a case history Columbia Business School - Columbia University - New York, NY November 19 2012 november 19 2012 | [email protected] | @StefanoOrsenigo

description

Presentation held at Columbia University on November 19, 2012 of ELISA. ELISA is a "smart" security device and this presentation illustrates its deployment in the logistic and transportation

Transcript of Presentation at Columbia University of ELISA security device

Page 1: Presentation at Columbia University of ELISA security device

When security is deployed

for the logistic industry:

ELISA, a case history

Columbia Business School - Columbia University - New York, NY November 19 2012

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 2: Presentation at Columbia University of ELISA security device

Meet ELISA:

Electronic Locking Interactive

Security Apparatus

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 3: Presentation at Columbia University of ELISA security device

General Market Concepts

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 4: Presentation at Columbia University of ELISA security device

Quality

november 19 2012 | [email protected] | @StefanoOrsenigo

In business, engineering and manufacturing, quality has a pragmatic interpretation as the

non-inferiority or superiority of something; it is also defined as fitness for purpose. Managing quality is fundamental to any activity and it implies: having a clear understanding of all

related aspects, measuring performance and taking

action to improve.

Page 5: Presentation at Columbia University of ELISA security device

“Being sure that a product arrives safely and undamaged to the final customer is obviously an aspect of its quality”

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 6: Presentation at Columbia University of ELISA security device

Customer satisfaction

november 19 2012 | [email protected] | @StefanoOrsenigo

a measure of how products and services supplied by a company meet or surpass customer expectation. In a competitive marketplace - where businesses compete for customers - customer satisfaction is

seen as a key differentiator and increasingly has become a key element of business strategy. It is therefore essential for businesses to effectively manage customer satisfaction.

Page 7: Presentation at Columbia University of ELISA security device

“Making sure that a product arrives safely and undamaged to the final customer is obviously closely tied to that customer’s satisfaction!”

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 8: Presentation at Columbia University of ELISA security device

Cost optimization

november 19 2012 | [email protected] | @StefanoOrsenigo

Adjusting a/all process/es so as to optimize some specified set of parameters without violating some constraint is known as process optimization.

!!!!

The most common benefits which derive from a successful optimization are: minimizing cost,

maximizing throughput and/or efficiency.

Page 9: Presentation at Columbia University of ELISA security device

“Making sure that all processes used to assure that the product arrives safely to the final customer are the best possible, obviously results into a more fluid and cost-effective system, one which gives the manufacturer better quality and higher customer satisfaction (and one that, therefore, can improve the company’s standing in the market)”

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 10: Presentation at Columbia University of ELISA security device

Specific Keywords (or Concepts)

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 11: Presentation at Columbia University of ELISA security device

Security:

november 19 2012 | [email protected] | @StefanoOrsenigo

The degree of protection necessary to safeguard something (or someone) against danger, damage, loss, and crime. As a form of protection it includes

all structures and processes that provide or

improve security as a condition. It also implies a condition in which one becomes

AWARE of the possibility that, in its development, a system can evolve into some unwanted states.

Page 12: Presentation at Columbia University of ELISA security device

Risk:

november 19 2012 | [email protected] | @StefanoOrsenigo

The Oxford English Dictionary defines risk as the: (Exposure to) the possibility of loss, injury, or other adverse or unwelcome circumstance; a chance or situation involving such a possibility. Risk is therefore the potential that a chosen ac-

tion or activity (including the choice of inaction) will lead to a loss (an undesirable outcome). The notion implies that a choice having an

influence on the outcome exists (or existed).

Page 13: Presentation at Columbia University of ELISA security device

Analysis:

november 19 2012 | [email protected] | @StefanoOrsenigo

The process of breaking a complex topic or

substance into smaller parts, to gain a better understanding of it.!Analysis, in business, is a fundamental step to

identify needs so that solutions can be devised

and implemented. It involves the study of the

activity conducted and of all relative statistics,

environment, procedures, workforce, risks and

other pertinent aspects, with the objective of producing an assessment of the situation.

Page 14: Presentation at Columbia University of ELISA security device

Management:

november 19 2012 | [email protected] | @StefanoOrsenigo

All the activities put in place when conducting an activity. Proper management includes procedures

for all possible stages of the activity: normal as

well as critical. In the area of security, proper management implies devising: •  preventive measures (actions put in place to

prevent the event of a possible risk) •  protective measures (actions put in place to

protect people and goods in the case of an hazard)

Page 15: Presentation at Columbia University of ELISA security device

The cycle of security Risk!Analysis!

knowledge!&!awareness!

Risk!Assessment!balance!&!selec6on!

Risk!Management!ac6on!&!measure!

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 16: Presentation at Columbia University of ELISA security device

Both awareness and prior knowledge are to be considered a method as well as an objective and as such they require an holistic approach, considering the interdisciplinary and the global issues related to the subject of security.

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 17: Presentation at Columbia University of ELISA security device

Security deployed for logistics

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 18: Presentation at Columbia University of ELISA security device

the landscape

november 19 2012 | [email protected] | @StefanoOrsenigo

Globalization and the consequent aperture of new markets requires that companies face new and

bigger challenges, to answer with quality and efficiency to client’s needs, especially in terms of flexibility, cost optimization and attention to the

environment.

Page 19: Presentation at Columbia University of ELISA security device

This has required, in the last decade, a continuous

push for innovation in industrial strategies, in the organization of the operational processes and in system management.

!!!!

Obviously, these development involve the field of logistics - as well as the supply chain infrastruc- tures and the systems used to manage them - which has also evolved to cater to the progressive

demand for new solutions and new approaches.

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 20: Presentation at Columbia University of ELISA security device

Logistic processes, thus, have grown and have been

implemented with a series of technical and

organizational optimizations, well supported by a technology that is increasingly becoming more efficient and cost-effective.

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 21: Presentation at Columbia University of ELISA security device

Nonetheless, to date, little attention (aside from the insurance point of view) has been placed on the

aspects that relate to the industrial security of

logistic processes and to its components. !!!!

Failing to acknowledge the consequences of such

oversight can heavily impact - in terms of quality as well as of economical and financial implications - on

the business.

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 22: Presentation at Columbia University of ELISA security device

Such consequences are readily accessible in daily news: property, information, equipment, supplies, personal belongings or intangible data, all can be stolen or damaged and the weakest link in the

supply chain is the process that takes a product

from the manufacturer to the consumer is the road

the product rides to reach the final user.

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 23: Presentation at Columbia University of ELISA security device

It is not easy, in fact, to monitor effectively the entire path the goods travel to go from point A to point B, primarily for two reasons:

!!!!

•  part of this process (like transportation or stock- age) is often assigned to third-party providers

•  consequences of damaging acts by internal

employees are considered more important than those perpetrated by other people, outside the company.

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 24: Presentation at Columbia University of ELISA security device

Logistics operators are obviously the ones primarily

affected by the “holes” in these processes, as they are responsible for stocking and moving the goods from one step to the next in the supply chain. !!!!

There are no certain statistics, although some researches quantify the security issue in a value

that goes from the 0,5% to the 1% of gross

income.

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 25: Presentation at Columbia University of ELISA security device

DHL has declared that, only in Europe, over 8 billion

Euros in value of high added-value goods are

stolen each year. !!!!

Not to mention the damage derived by the loss in

image by the company.

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 26: Presentation at Columbia University of ELISA security device

In such a complex and ever-changing environment the primary efforts need be focused on developing

integrated products and services at an accessible

cost, characterized by innovative high technologies. !!!!

The challenge? Delivering dynamic and sustainable answers to the ever-changing needs of logistics operators in the secure management of the supply chain.

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 27: Presentation at Columbia University of ELISA security device

ELISA: the project

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 28: Presentation at Columbia University of ELISA security device

In this landscape, therefore, the need to rethink

the various processes involved appeared evident. !!!!

We chose to approach the issues with a methodological approach that implied the following, consequential activities:

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 29: Presentation at Columbia University of ELISA security device

•  Risk Analisys - to identify vulnerabilities, the probabilities of happening and the type of dangers and liabilities;

•  Risk Assessment - with the aim of balancing risks and actions and of selecting the best and more opportune interventions;

•  Risk Management - to apply the appropriate procedures and the best methodologies of management;

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 30: Presentation at Columbia University of ELISA security device

the risks

november 19 2012 | [email protected] | @StefanoOrsenigo

The analysis of the activities implemented in the entire logistic path evidenced how the security

risk is directly tied to the increased incidence of certain factors: •  poorly controlled (or controllable) fluxes; •  increasingly small dimensions of products/goods; •  high added-value of products/goods; •  recyclability of products.

Page 31: Presentation at Columbia University of ELISA security device

the assessment

november 19 2012 | [email protected] | @StefanoOrsenigo

The evaluation of the elements of risk allowed for the definition of a solution based upon an

innovative Integrated Security Model founded on

a systemic base rather than on a technological

premise.

Page 32: Presentation at Columbia University of ELISA security device

The system is built on a IOT (Internet of Things) platform that can offer at any time, through ITS

(Intelligent Transportation Systems) and ALS

(Advanced Logistic Services) solutions to assure the automatic traceability and recoverability of goods

and products along the entire supply chain

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 33: Presentation at Columbia University of ELISA security device

This allows Logistic Operators to monitor without

interruptions and in real-time the path followed by

the goods, the resources and the premises/

facilities, regardless of their location. !!!!

Obviously, this increases significantly the

operative efficiency and the level of protection

applied to the assets, allowing for more secure supply chains

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 34: Presentation at Columbia University of ELISA security device

Furthermore, these solutions address and resolve also, amongst others, some important issues

related to the safety of the products: •  by preventing or deterring counterfeiting and

tampering; and •  by assuring the conformity of transportation

and stocking with the most different legal requirements

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 35: Presentation at Columbia University of ELISA security device

the solution: ELISA

november 19 2012 | [email protected] | @StefanoOrsenigo

An “intelligent transportation unit” made up by: •  a container, fit for logistic transportation; •  an integrated “smart” closing device. !!!!

The system is completed by the capability of an interactive connection with a Central Management

Platform.

Page 36: Presentation at Columbia University of ELISA security device

ELISA: the Apparatus

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 37: Presentation at Columbia University of ELISA security device

the innovative container

november 19 2012 | [email protected] | @StefanoOrsenigo

ELISA’s peculiarly die-cut cardboard container

(subject also to a specific industrial patent) allows for a perfect homogeneity and geometric

continuity which guarantees for excellent anti-

burglary protection, while maintaining an elevated

ergonomic quality and an equally high

manageability.

Page 38: Presentation at Columbia University of ELISA security device

the ”smart” closure

november 19 2012 | [email protected] | @StefanoOrsenigo

ELISA’s particular container is associated to a

specially designed smart closing device.

Page 39: Presentation at Columbia University of ELISA security device

Structurally, the closing device is composed of two

elements of closure made of biodegradable plastic, one of which is immovably connected with

the internal closing flap of the container. The other

element is actively operative on the external

closing flap. !!!!

The internal locking element is predisposed to accommodate different types (and levels) of technology, according to the operative requirements

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 40: Presentation at Columbia University of ELISA security device

The innovative structural characteristic of ELISA’s closing system is the perfect integration of

different technological devices with the internal

locking element. !!!!

This way, once closed, the container becomes “self-protecting”.

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 41: Presentation at Columbia University of ELISA security device

technological add-ons

november 19 2012 | [email protected] | @StefanoOrsenigo

The closing system can be integrated with scalable

technological devices which can modularly add functionalities such as: •  simple identification and space-time localization

through R.F.I.D. (Radio Frequency Identification), •  sophisticated functions of security, control and

monitoring through ITS (Intelligent Transportation Systems), ALS (Advanced Logistic Services) and GPS (Global Positioning System)

Page 42: Presentation at Columbia University of ELISA security device

connectivity

november 19 2012 | [email protected] | @StefanoOrsenigo

ELISA can exchange data and information with a remote Management & Control Platform

through diverse standards of communication, such as N.F.C. (Near Field Comunication), GSM/

GPRS or satellite.

Page 43: Presentation at Columbia University of ELISA security device

adaptability

november 19 2012 | [email protected] | @StefanoOrsenigo

The innovative functional characteristic of ELISA’s closing system is its dynamic adaptability to any

requirement/need that may be opportune in

different situations for each parcel.

Page 44: Presentation at Columbia University of ELISA security device

Summary of functionalities

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 45: Presentation at Columbia University of ELISA security device

Thanks to its innovative concepts and inventions, ELISA allows for:

!!

-  monitoring the packing activity with respect to the “picking list” of the order, memorizing the qualitative and quantitative data that refers to the nature and/or the quantity of the goods held by the container

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 46: Presentation at Columbia University of ELISA security device

-  automate and optimize the different

management and control processes on the entire

logistic path of the supply chain, including: !

•  traceability of the goods; •  correct loading sequence on the different

vectors; •  stock management and warehouse

restocking; •  automatic detection of attempted forceful

opening or tampering of container;

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 47: Presentation at Columbia University of ELISA security device

•  automatic detection of attempted theft or

concealment of the entire package; •  control of the conformity of transportation/

stocking of goods to ensure the respect of the required legal parameters and procedures (through the monitoring of the environmental characteristics detectable inside and outside the container);

•  permanent connection with a Management &

Control Center, to exchange data and collect information in real time.

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 48: Presentation at Columbia University of ELISA security device

ELISA is based on an industrial patent, conferred with a high level of innovation and inventiveness

which, do date, is extended over Europe, USA and Canada.

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 49: Presentation at Columbia University of ELISA security device

Conclusions

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 50: Presentation at Columbia University of ELISA security device

ELISA represents a good example of a new and

innovative approach to security in the logistics

context. !!!!

Through a rigorous scientific, technological and managerial approach, this system can guarantee operators in the field of logistics the utmost

technical compatibility for every shipment and, from an economical point of view the best adapt-

ability for most types of transportation needs.

november 19 2012 | [email protected] | @StefanoOrsenigo

Page 51: Presentation at Columbia University of ELISA security device

Thank you for your attention

(and patience with the language)

Contacts: [email protected] @StefanoOrsenigo

november 19 2012 | [email protected] | @StefanoOrsenigo