Preprint
Review

Bibliometric Insights into Balancing Efficiency and Security in Urban Supply Chains

Altmetrics

Downloads

148

Views

42

Comments

0

A peer-reviewed article of this preprint also exists.

This version is not peer-reviewed

Submitted:

09 July 2024

Posted:

10 July 2024

You are already at the latest version

Alerts
Abstract
This study examines the balancing between urban transportation security and supply chain efficiency amid global disruptions like the COVID-19 pandemic, attacks on maritime lanes, and geopolitical conflicts. The authors combine bibliometric network analysis and natural language processing (NLP) to review scholarly literature from 2017 to 2023. This approach identifies and visualizes evolving thematic trends. Findings reveal a shift towards integrating advanced technologies such as blockchain, AI, and IoT to enhance security without compromising efficiency. This study highlights the significance of integrating urban planning principles and sustainable practices to enhance transportation security and supply chain efficiency within urban environments. Actionable insights for policymakers and supply chain managers emphasize the adoption of integrated, technology-driven security solutions to foster resilient and sustainable supply chains. This research contributes to academic discourse by refining the understanding of evolving priorities in transportation security and supply chain management, offering both theoretical and practical implications for secure and efficient global supply chains.
Keywords: 
Subject: Social Sciences  -   Transportation

1. Introduction

The secure and uninterrupted transportation of goods is vital for global supply chains. Efficiency is not just an operational goal but a key determinant of economic vitality and competitiveness [1]. Urban planning and development are crucial for optimizing transportation routes, reducing congestion, and enhancing supply chain efficiency in metropolitan areas. Global supply chains form a complex network involving diverse stakeholders, including businesses, governments, non-profit organizations, and individuals. These stakeholders operate from local communities to international trade corridors. In this multifaceted network, transportation threats have escalated, necessitating security as an integral part of supply chain management. Hence, there is a critical need to continually bolster urban resilience through strategic planning and advanced security measures, ensuring the well-being of urban populations during disruptions. Ensuring the safe transit of goods, protecting sensitive information, and maintaining confidentiality are crucial for safeguarding the entire supply chain ecosystem [2].
This study employs bibliometric network analysis and natural language processing (NLP) techniques to uncover thematic trends in the intersection of transportation security and supply chain efficiency. This novel approach to systematic reviews provides a comprehensive analysis of existing literature, identifying the evolving priorities and gaps in the field. Globalization has created a modern supply chain that is a complex network of activities, resources, and technologies aimed at producing and moving goods efficiently. Multimodal transportation and security are central to this network, facilitating the physical flow of goods across geographic boundaries. Figure 1 illustrates how transportation security integrates into supply chains, highlighting the dynamic flow of materials and products essential for both efficiency and security. Secure transportation ensures product delivery to stakeholders and significantly enhances supply chain agility and resilience. Urban mobility solutions, including sustainable transport options, play a vital role in maintaining efficient and secure supply chains. Transportation security includes physical security protocols and cybersecurity measures to mitigate risks of theft, tampering, and disruptions. Transportation security, therefore, is not just about asset protection but is instrumental in maintaining the seamless operation of global supply chains, influencing efficiency, reliability, and stakeholder trust.
Recent global disruptions, like the COVID-19 pandemic, have exposed vulnerabilities in supply chains. Delays in critical medical supplies during the pandemic highlighted the fragility of these networks [3]. These challenges emphasize the need for strategies that are robust, secure, resilient, and adaptable, especially during crises [4]. Stringent security protocols are essential but can lead to operational delays, increased costs, and complexity in supply chain operations [5]. Hence, balancing security and efficiency is crucial to mitigate vulnerabilities and maintain supply chain responsiveness and profitability.
Traditionally, transportation has focused on speed and cost-effectiveness, emphasizing rapid delivery times and minimizing expenses [6]. However, global interconnectedness has introduced complexities and threats, prompting a shift in foundational assumptions about the logistics of transportation. Current security concerns include piracy, geopolitical conflicts, and escalating cyber threats, necessitating a reconfiguration of transportation strategies to balance efficiency, cost, and security.
This study aims to decipher the interplay between transportation security and supply chain efficiency. The methodology combines bibliometric network analysis and bigram distribution analysis using NLP to visualize and recognize thematic trends and patterns. The study hypothesizes an intrinsic interdependency between supply chain efficiency and transportation security, with decisions and policies in one area significantly impacting the other.
This research contributes academically and practically by examining how transportation security has evolved and its impact on supply chain efficiency. Reviewing security measures from the pre-COVID era (2017-2019) to the more recent landscape (2020-2023) helps understand their symbiotic relationship. By not restricting the analysis to specific geographic locations or transportation modes, the study presents a generalized overview applicable across various contexts and scales. Existing literature lacks a comprehensive understanding of how transportation security directly correlates with supply chain efficiency. This study addresses this gap by employing an algorithmic workflow that includes text cleaning and bigram analysis, unveiling thematic shifts and priorities in recent literature. The insights provide clear directions for policymakers and practitioners in developing resilient, secure, and efficient supply chains in today's volatile global market.
The structure of the remainder of this study is as follows: Section 2 synthesizes the literature on supply chain management, focusing on efficiency and security. Section 3 explains the methodological approach. Section 4 presents the findings with visual depictions of the thematic landscape. Section 5 offers a deeper interpretation of the results. Section 6 concludes the study, reflecting on its implications and suggesting pathways for future research.

2. Literature Review

This section reviews the literature on supply chain management, focusing on the interplay between transportation security and supply chain efficiency.

2.1. Themes and Theories

The literature reveals several key themes and theories relevant to this intersection:
Transportation Security: This involves safeguarding goods and raw materials within the supply chain from threats and disruptions [2]. Dynamic security measures are essential for adapting to evolving threats. Crisis response is a critical component of transportation security, encompassing contingency plans for various incidents to minimize supply chain impacts. Supply chain security practices include customizable policies and protocols unique to each organization, aimed at preventing, detecting, and responding to threats within the supply chain [2].
Risk Management: This area focuses on identifying, assessing, and mitigating risks in transportation to minimize the occurrence and impact of disruptions. Effective risk management strategies are crucial for maintaining supply chain efficiency while ensuring security [7].
Supply Chain Resilience: This concept refers to the ability to withstand and recover from disruptions. Strategies for resilience include alternative routes, redundant infrastructure, and enhanced collaboration among supply chain partners [8].
Supply Chain Efficiency: This involves optimizing operational procedures for timely, cost-effective, and robust production and distribution. Key efficiency metrics include inventory turnover, fill rate, order fulfillment lead time, cost per order, return on assets, and environmental metrics like carbon footprint [9]. Reliable transportation is crucial for the cost-effective movement within supply chains, facilitating business operations, growth, and competitiveness.

2.2. Historical Perspective

Transportation security has evolved significantly over time, influenced by technological advancements, global events, and changing threats [10]. Initially, physical security measures such as roadblocks for caravans and marshals for trains were predominant [11,12,13]. The rise of air travel introduced basic measures like metal detectors [14]. Post-9/11, the Federal Aviation Administration (FAA) overhauled security systems to include advanced metal detectors and X-ray machines [15,16,17].
Modern Security Measures: Modern transportation security incorporates technologies like Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS) for data protection [18] and the Internet of Things (IoT) for real-time infrastructure monitoring [19]. Emerging technologies like artificial intelligence (AI) and machine learning (ML) are reshaping security, with applications such as robotic dogs for substance detection and uncrewed vehicles for threat management [20,21,22,23,24]. Blockchain-based smart contracts offer promising solutions for enhanced transportation security through real-time monitoring and efficient information sharing [25,26,27,28,29].
Organizational Culture and Standardization: An organizational culture centered on security, along with effective policies, can mitigate security breaches and disruptions [30]. However, security measures vary across industries and regions, necessitating tailored approaches [31,32,33]. Collaborative efforts and information sharing among stakeholders are vital for supply chain security [5]. Standardization driven by organizations like the International Civil Aviation Organization (ICAO) and the International Maritime Organization (IMO) is crucial for harmonizing global transportation security measures [34]. Adherence to standards like ISO 28001 helps identify and address security vulnerabilities [35,36,37].
Technological Innovations: The literature highlights the potential for innovation and technology in enhancing security and efficiency in supply chains [38]. Intellectualization, innovation, and modern technologies are key to addressing modern supply chain complexities [39,40,41]. Blockchain and IoT are pivotal in enhancing security and efficiency, offering real-time monitoring and data collection.
Key Performance Indicators (KPIs): Specific KPIs quantify the efficacy of transportation security protocols. These include incident rates of theft and tampering, percentage of on-time deliveries unaffected by security issues, frequency of security audits, and the number of security breaches successfully identified and thwarted [42]. The ratio of security-related costs to the value of protected goods provides insight into the economic impact of security investments.
Despite extensive research on transportation security and supply chain efficiency, there is a notable gap in empirical studies that quantitatively measure the impact of security measures on supply chain performance metrics. This gap indicates a need for further research to provide a systematic and quantitative understanding of transport security within the supply chain narrative.

3. Materials and Methods

This study employs a systematic and comprehensive approach to examine the interplay between transportation security and supply chain efficiency [43]. The methodology includes database selection, search strategy, inclusion and exclusion criteria, bibliometric analysis, and advanced natural language processing (NLP) techniques.

Database Selection and Search Strategy

The study utilized Scopus and Web of Science as the core databases for their extensive repositories of scholarly works on transportation security and supply chain efficiency. Systematic literature reviews (SLRs) widely use these databases because of their high-quality content, comprehensive indexing, citation tracking, and advanced search capabilities. This review also utilized Google Scholar to identify any relevant literature not covered by the core databases. The search strategy employed the Boolean command ("supply chain" AND "security") AND ("transportation" OR "transport") to retrieve articles. The search focused on literature from 2017 to 2023 to capture trends and developments pre- and post-COVID. This yielded 1228 articles, which a filter narrowed down to 680 by focusing on journal articles and books written in English.

Inclusion and Exclusion Criteria

The initial screening prioritized journal articles that directly addressed the interplay between transportation security and supply chain efficiency. The authors reviewed titles and abstracts for relevance, and removed duplicates, resulting in 59 relevant articles. A detailed review of the introductory and concluding sections of these articles further reduced the number to 32, which met the criteria of discussing both transportation security and supply chain efficiency. Table 1 in the results section enumerates the articles forming the basis of this thematic review.

Bibliometric Analysis

The study employed VOSviewer software (version 1.6.20) to conduct a bibliometric analysis of the initial search results [44]. The bibliometric analysis produced a network map visualization based on the co-occurrence of important terms. This map illustrated the frequency and relationships of keywords within the literature, helping to identify key themes and sub-themes. The advanced clustering algorithms of the tool grouped related terms into clusters, with the size of nodes and thickness of links indicating the frequency and strength of relationships. This analysis highlighted the overall thematic structure and trends within the research fields of transportation security and supply chain efficiency.

Thematic Categorization

The study categorized the corpus into pre- and post-COVID temporal cohorts to facilitate a comparative thematic analysis. This division allowed for an examination of trends and shifts due to the pandemic's impact. Thematic categorization employed bigram analysis, a method in text analytics that identifies pairs of adjacent words to illuminate syntactic and semantic relationships. This method surpasses single-word extraction by providing a deeper understanding of recurring themes within the literature corpus. The thematic categorization utilized advanced NLP techniques through the Python programming language, leveraging libraries such as `re` for regular expressions, NLTK for language processing tasks, and PyPDF2 for handling PDF files [45]. The NLP protocol involved several steps:
  • Stop Word Removal: Filtering out common stop words and irrelevant terms to enhance analytical precision.
  • Bigram Extraction: Identifying the top five bigrams by frequency for each article after applying lemmatization to convert words to their root forms.
  • Bigram Aggregation: Pooling extracted bigrams across all articles within each document group and ranking them by frequency.
  • Frequency Analysis: Highlighting the most prominent themes and terms within the literature corpus.
  • Distribution Analysis: Examining the frequency and context of top bigrams to reveal thematic shifts over time.
  • Visualization: Generating word clouds and distribution graphs to visually represent the predominant themes within each temporal cohort.
The visualization of bigrams facilitated a nuanced understanding of the interplay between terms, highlighting the interconnected conceptual landscape of transportation security and supply chain efficiency. The analysis extended beyond frequency counts to include contextual examinations of sentences containing these bigrams, ensuring qualitative relevance.

Algorithmic Workflow

The algorithmic workflow depicted in Figure 2 represents the methodological sequence crafted to assess and interpret the literature.
This workflow comprised two key analytical sections: Data Processing and NLP with Visualization.
Data Processing:
  • Step 1: Database Identification—identifying databases rich in relevant research articles.
  • Step 2: Keyword Formulation—creating a list of search terms.
  • Step 3: Temporal Filter—conducting searches within the specified year range.
  • Step 4: Criteria-Based Filtering—screening search results based on inclusion and exclusion criteria.
  • Step 5: Bibliometric Analysis—generating term co-occurrence networks.
  • Step 6: Topical Relevance Filtering—ensuring selected literature contributes meaningfully to the objectives of the study.
NLP and Visualization:
  • Step 1: Corpus Bifurcation—segmenting literature into pre- and post-COVID temporal cohorts for trend analysis.
  • Step 2: Stop Word Removal—enhancing focus on content-rich words.
  • Step 3: Bigram Extraction—identifying significant word pairs.
  • Step 4: Bigram Aggregation—aggregating and ranking bigrams by frequency.
  • Step 5: Frequency Analysis—highlighting prominent themes.
  • Step 6: Distribution Analysis—identifying thematic shifts over time.
  • Step 7: Visualization—creating word clous visual representations of thematic data.
This detailed methodology enables a reproducible approach to extracting and analyzing data, providing a robust understanding of the thematic landscape within transportation security and supply chain efficiency.

4. Results

This section synthesizes the key findings from the literature, highlighting recurrent themes and patterns that explain the intricate interplay between transportation security and supply chain efficiency. Figure 3 presents a co-occurrence term map for the filtered corpus, generated using the VOSviewer tool. The map visualizes the relationships and frequencies of key terms within the dataset, illustrating the thematic structure of the combined research fields.
The map displays five clusters, each representing a different thematic area within the research fields:
  • Red Cluster: the main themes are sustainability and energy with key terms including “energy security,” “sustainable development,” “carbon footprint,” and “environmental impact.”
  • Green Cluster: the main themes are risk and security within the supply chain with key terms being “supply chain security,” “risk assessment,” “network security,” and “freight transportation.”
  • Blue Cluster: the main themes are technology and data management with key terms being “blockchain,” “cybersecurity,” “internet of things,” and “smart contract.”
  • Yellow Cluster: the main themes are food security and the impacts of the COVID-19 pandemic with key terms being “food quality,” “pandemic,” and “livelihood.”
  • Purple Cluster: the main themes are economic and social effects with key terms being “energy utilization,” and “health care.”
The terms “supply chain,” “supply chains,” and “supply chain management” appear centrally in the map, reflecting the search criteria and indicating their high frequency of occurrence within the corpus. These terms connect to multiple clusters, reflecting their interdisciplinary nature and centrality to the research field. The lines connecting the terms represent the co-occurrence relationships, with thicker lines indicating higher co-occurrence frequencies, representing stronger connections. The dense network of connections highlights the interrelatedness of various topics within the field. The presence of terms like “blockchain,” “smart contract,” and “cybersecurity” suggests the growing importance of digital technologies and data security in supply chain management and transportation security. The variety of terms and clusters depicted in the map highlights the diverse research focus areas within these fields, ranging from sustainability and energy efficiency to risk management, technological advancements, and the socio-economic impacts of the COVID-19 pandemic.
The thematic analysis revealed a progression from a primary focus on balancing technology-driven security with operational efficiency to a more integrated approach that encompasses environmental sustainability and cyber resilience. The study categorized themes into five main areas, summarized in Table 1. Figure 4, Figure 5 and Figure 6 illustrate the thematic shifts between the pre- and post-COVID periods.
Table 1. Themes revealed and their representative literature.
Table 1. Themes revealed and their representative literature.
Category Theme Sample Articles
Emerging Technologies Blockchain and biometrics are pivotal in enhancing security and transparency in transportation [1,4,5,26,27,28,29,39,40,41,46,47,48]
Environmental Considerations Integrating environmental sustainability with security in transportation is crucial for resilient supply chains. [49,50]
E-commerce Challenges The surge in e-commerce demands innovative security strategies for efficient and safe package delivery. [51,52]
Standardization and Regulation Needs Consistent standards and regulations are vital for ensuring security, especially in international supply chains. [30,35,36,37,53,54,55]
Practical Insights from Real-World Scenarios Empirical studies offer valuable insights into the practical challenges and potentials of transportation security systems. [10,31,32,33,34,56,57,58]
In the pre-COVID cohort, the predominant themes centered on integrating technology and data analytics to balance transportation security and supply chain efficiency. Discussions focused on advanced technologies like blockchain, security key transfers, effective management practices, and comprehensive inspection protocols. The focus was on leveraging these elements to enhance security measures in transportation while optimizing supply chain operations. In the post-COVID cohort, the themes evolved to include environmental sustainability (e.g., keywords include “emissions,” and “ghg” meaning greenhouse gas) and cyber resilience. That is, the literature expanded to address not only the dual objectives of security and efficiency but also the broader goal of creating a resilient and sustainable supply chain ecosystem. This shift reflects a growing recognition of the need to adapt transportation security strategies to contemporary challenges like environmental sustainability and the increasing threat of cyberattacks.
These visualizations serve as integral algorithmic tools that distill complex data into visual formats, enabling humans to immediately recognize predominant keywords that encapsulate themes within the literature. The word cloud emphasizes the frequency of specific terms, providing a visual representation of thematic saturation. The bigram distribution highlights the contextual relationships between key terms, offering insights into the interplay of concepts relevant to transportation security and supply chain efficiency.
Overall, the thematic analysis revealed a shift from a focus on technology-driven security and operational efficiency to an integrated approach that includes sustainability and cyber resilience. The need to continuously evolve in response to technological advancements and environmental considerations compounds the challenges of managing a secure, efficient, and adaptable supply chain and transportation system.

5. Discussion

This analysis goes beyond merely aggregating existing studies to provide a refined and detailed examination of the complex interplay between transportation security and supply chain efficiency. By employing NLP techniques, the study dissected the literature to reveal prevailing themes and the intricate relationships and impacts these areas have on one another. This approach uncovered the subtle dynamics that underpin the interaction between robust security measures and the pursuit of operational efficiency within supply chains.
The co-occurrence term map of the bibliometric analysis enriches this analysis by visually representing the relationships and frequencies of key terms within the dataset. Central themes such as “supply chains,” “supply chain management,” and “supply chain security” illustrate their interdisciplinary connections and importance within the research field. The identified clusters, color-coded to distinguish different thematic areas, reveal the intricate links among sustainability, risk management, and technological advancements related to transportation security and supply chain efficiency.
The identified themes advocate for a harmonized approach to transportation security and supply chain efficiency. The selected literature reveals a spectrum of themes from conventional security measures to innovative technologies. Strategies for adapting supply chains to evolving market conditions were diverse, with thorough analyses of various supply chain efficiency metrics. However, a notable gap was the infrequent integration of security and efficiency perspectives, with most studies focusing on one aspect. The bibliometric map highlights the diverse research focus areas within the field, ranging from sustainability and energy efficiency to risk management, technological advancements, and the socio-economic impacts of the COVID-19 pandemic. The central position of terms related to digital transformation, such as “blockchain” and “cybersecurity,” indicates the growing importance of integrating advanced technologies into supply chain strategies.
The methodologies in the reviewed literature varied from empirical data analysis to theoretical explorations. This diversity, while enriching the discourse, posed challenges in synthesizing a unified understanding. Notably, literature from 2017-2019 demonstrated a limited focus on environmental sustainability. The growing concern for environmental sustainability necessitates that policymakers align transportation security measures with green initiatives. Incorporating urban green spaces and sustainable land use practices can mitigate the environmental impact of transportation activities, promoting a healthier urban climate. As sustainability gains prominence, organizations must align their supply chain and transportation security strategies with eco-friendly practices, such as optimizing delivery routes and utilizing renewable energy sources.
Effective transportation security should be comprehensive, blending traditional measures with advanced technologies like blockchains and drones. Urban energy solutions, such as renewable energy sources for transportation, are essential for creating sustainable and resilient urban supply chains. Policymakers need to craft policies that encompass these diverse elements. The shift in scholarly focus toward technologies that bolster both security and efficiency, particularly in publications from 2020 to 2023, highlights the need for integrated frameworks. With the rapid evolution of technology, organizations must develop dynamic security measures to address emerging threats. A multi-layered security approach, combining novel technologies with traditional methods can provide robust protection. Integrating circular economy principles within urban logistics can further enhance the sustainability and resilience of supply chains. The concept of the “weakest link” in supply chain security suggests the need for proactive risk assessments and security audits, extending beyond mere legal compliance.
The literature suggests that organizations should prioritize digital transformation to enhance both efficiency and security. This includes cybersecurity training, secure data exchange protocols, and regular updates to digital infrastructure. With the rise of e-commerce and digital supply chains, threats have increasingly become technological. Investments in advanced technologies are crucial for countering these evolving digital threats. Furthermore, the complexity of supply chain security calls for collaborative efforts. Public-private partnerships can share resources and knowledge, foster innovation, and enhance overall security. However, regional limitations and a scarcity of empirical studies further restrict the generalizability and practical applicability of these findings.
This research had some limitations. The bigram-based thematic analysis, while foundational, depends on the depth of the existing literature and lacks direct real-world case studies linking transportation security and supply chain efficiency. The absence of data to measure the impact of transportation security on common supply chain efficiency metrics limits the conclusiveness of the thematic analysis. The compartmentalization of technology, business operations, and economic factors hinders a holistic perspective, creating interdisciplinary gaps.
Although the literature search captured the bulk of journal articles covering the two main topics, the authors acknowledge that this focus may lack the full spectrum of industry practices. Future research should focus on conducting empirical studies to validate the findings and explore new algorithms to evaluate the benefits and costs of implementing advanced security technologies in various supply chain contexts. These recommendations aim to fill the remaining gaps and contribute to a holistic understanding of the strategic importance of transportation security in sustaining efficient and resilient supply chains. This review sets the stage for future iterations to incorporate emerging studies. Furthermore, surveys and case studies documenting organizational experiences with enhanced transport security measures could provide qualitative insights into this dynamic.

6. Conclusion

This study demonstrates that transportation security and supply chain efficiency are not inherently conflicting. Properly implemented security strategies can enhance supply chain efficiency, while inadequate security measures can hinder it. The findings highlight the importance of urban planning and sustainable city initiatives in creating resilient and efficient transportation networks. Exploring the influence of environmental sustainability on transportation security and supply chain efficiency is increasingly pertinent. Urban resilience and climate adaptation strategies should be integral to future transportation and supply chain policies to address the challenges posed by urbanization and environmental changes. The bibliometric analysis reinforces these insights by visually representing the relationships and frequencies of key terms within the literature, highlighting central themes such as “supply chain management,” “sustainability,” and “blockchain.” This visualization highlights the interdisciplinary connections and the importance of integrating advanced technologies and sustainable practices into supply chain strategies. A key finding is that traditional security practices, such as physical and informational inspections, are indispensable but can sometimes impede supply chain velocity. A balance is essential to ensure security without significantly sacrificing efficiency. Advanced technologies like blockchain offer innovative approaches to enhancing security without undermining efficiency. They facilitate transparent and secure monitoring to streamline operations and reduce audit-related expenses. Bigrams like “Final Mile” and “Known Consignor” highlight the link between security effectiveness and operational efficiency. Streamlined operations can bolster security by minimizing vulnerabilities. Balancing security measures with economic viability and environmental sustainability adds complexity. While security implementations incur costs, they can yield efficiency gains, reducing losses from theft, fraud, and regulatory penalties.
The findings of this study illuminate several avenues through which policymakers can draft more effective regulations, standards, and action plans to bolster transportation security and supply chain efficiency. By identifying key technological innovations and security practices that enhance supply chain resilience without compromising efficiency, this research offers a foundation for developing comprehensive policies to integrate the latest advancements in security technologies. Moreover, this study highlights the limitations of existing policies, particularly in adapting to the rapidly evolving landscape of global trade and technology. The research suggests that an agile, technology-forward approach to policy formulation could bridge these gaps, facilitating more resilient and efficient supply chains. Stakeholders, from government regulators to supply chain managers and technology providers, stand to benefit from these insights. By leveraging the findings of this study, policymakers can create a more secure, efficient, and sustainable global supply chain network. In particular, policymakers could encourage the adoption of advanced security technologies through incentives or subsidies, especially in critical supply chain sectors. Supply chain managers should consider adopting a layered security approach and investing in continuous training to keep pace with technological advancements.

Author Contributions

Conceptualization, E.J. and R.B.; methodology, E.J. and R.B.; software, E.J. and R.B.; validation, E.J. and R.B.; formal analysis, E.J. and R.B.; investigation, E.J. and R.B.; resources, E.J. and R.B.; data curation, E.J. and R.B.; writing—original draft preparation, R.B.; writing—review and editing, E.J. and R.B.; visualization, E.J. and R.B.; supervision, R.B.; project administration, R.B. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

This article includes the original contributions presented in the study.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. V. А. Kulik, V. Y. Marchuk, O. M. Harmash, O. V. Karpun and N. M. Perederii, "Security Management of Intermodal Transportation in Conditions of Sustainable Development of Global Supply Chains," Electronic Scientific and Practical Publication in Economic Sciences, pp. 45-56, 2022.
  2. S. H. Zailani, K. S. Subaramaniam, M. Iranmanesh and M. R. Shaharudin, "The impact of supply chain security practices on security operational performance among logistics service providers in an emerging economy: Security culture as moderator," International Journal of Physical Distribution & Logistics Management, vol. 45, no. 7, pp. 652-673, 2015. [CrossRef]
  3. U. G. Okafor, M. A. Olalaye, H. C. Asobara and E. F. Umeodinka, "Global impact of COVID-19 pandemic on public health supply chains," in Science-Based Approaches to Respond to COVID and Other Public Health Threats, E. Guerrero, Ed., IntechOpen, 2021, p. 280.
  4. S. K. Nanda, S. K. Panda and M. Dash, "Medical supply chain integrated with blockchain and IoT to track the logistics of medical products." Multimedia Tools and Applications," vol. 82, p. 32917–32939, 2023.
  5. I. G. Koliousis, U. Tanveer and S. Ishaq, "A Conceptual Information Sharing Framework to Improve Supply Chain Security Collaboration," International Journal of Value Chain Management, vol. 11, no. 4, pp. 346-365, 2020.
  6. T. P. Stank and T. J. Goldsby, "A Framework for Transportation Decision Making in an Integrated Supply Chain," Supply Chain Management: An International Journal, vol. 5, no. 2, pp. 71-78, 2000. [CrossRef]
  7. Y.-C. Yang, "Impact of the container security initiative on Taiwan's shipping industry," Maritime Policy & Management, vol. 37, no. 7, pp. 699-722, 2010.
  8. J. E. Gould, C. Macharis and H.-D. Haasis, "Emergence of security in supply chain management literature," Journal of Transportation Security, vol. 3, pp. 287-302, 2010.
  9. S. Chopra and P. Meindl, Supply Chain Management: Strategy, Planning, and Operation, Pearson, 2014, p. 516.
  10. M. T. Alshurideh, B. A. Kurdi, A. A. Alzoubi and M. Al-Okaily, "The Impact of Transportation Reliability on Supply Chain Efficiency at UAE Maritime Industry," International Journal of Business Analytics and Security, vol. 2, no. 1, pp. 141-154, 2022.
  11. W. Schivelbusch, The Railway Journey: The Industrialization of Time and Space in the Nineteenth Century, University of California Press, 2014, p. 248.
  12. A. Casadevall, "Antibody-based vaccine strategies against intracellular pathogens," Current Opinion in Immunology, vol. 53, pp. 74-80, 2018.
  13. E. Candra, A. Azmi and A. Gunawati, "Position and Protection of Association Rights Security Unit in Human Rights Perspective According to the Basic State Law of the Republic of Indonesia Year 1945," JHR (Jurnal Hukum Replik), vol. 9, no. 2, pp. 157-171, 2021.
  14. G. Flitton, T. P. Breckon and N. Megherbi, "A 3D extension to cortex like mechanisms for 3D object class recognition," in 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, 2012.
  15. G. Blalock, V. Kadiyali and D. H. Simon, "The impact of post-9/11 airport security measures on the demand for air travel," The Journal of Law and Economics, vol. 50, no. 4, pp. 731-755, 2007.
  16. P. Seidenstat, "Terrorism, airport security, and the private sector," Review of Policy Research, vol. 21, no. 3, pp. 275-291, 2004.
  17. E. KARŞIGİL and A. T. E. Ş. Savaş, "Security Control Process Modeling During the Covid-19 Pandemic: Example Of Esenboğa Airport," Akıllı Ulaşım Sistemleri ve Uygulamaları Dergisi, vol. 5, no. 2, pp. 188-199, 2022.
  18. R. Holz, Y. Sheffer and P. Saint-Andre, "Recommendations for secure use of transport layer security (TLS) and datagram transport layer security (DTLS)," RFC 7525, 2015.
  19. S. Nižetić, P. Šolić, D. L.-d.-I. Gonzalez-De and L. Patrono, "Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future," Journal of Cleaner Production, vol. 274, p. 122877, 2020. [CrossRef]
  20. F. Wang, L. P. Casalino and D. Khullar, "Deep learning in medicine—promise, progress, and challenges," JAMA internal medicine, vol. 179, no. 3, pp. 293-294, 2019.
  21. C. Morosan, "Theoretical and empirical considerations of guests’ perceptions of biometric systems in hotels: Extending the technology acceptance model," Journal of Hospitality & Tourism Research, vol. 36, no. 1, pp. 52-84, 2012.
  22. D. Nyale and S. M. Angolo, "A Survey of Artificial Intelligence in Cyber Security," International Journal of Computer Applications Technology and Research, vol. 11, no. 12, pp. 474-477, 2022.
  23. M. Nikita, L. Kashyap, B. P. Singh and D. Tyagi, "AI Enabled Advance Surveillance System," International Research Journal of Modernization in Engineering Technology and Science, vol. 5, no. 4, 2023.
  24. Y. Yu and, S. Lee, "Remote driving control with real-time video streaming over wireless networks: Design and evaluation," IEEE Access, vol. 10, pp. 64920-64932, 2022.
  25. M. Lou, X. Dong, Z. Cao and J. Shen, "SESCF: A Secure and Efficient Supply Chain Framework Via Blockchain-Based Smart Contracts," Security and Communication Networks, pp. 1-18, 2021.
  26. A. Shahzad, K. Zhang and A. Gherbi, "Intuitive development to examine collaborative IoT supply chain system underlying privacy and security levels and perspective powering through proactive blockchain," Sensors, vol. 20, no. 13, p. 3760, 2020.
  27. X. Zhang, P. Sun, J. Xu, X. Wang, J. Yu, Z. Zhao and Y. Dong, "Blockchain-based safety management system for the grain supply chain," IEEE Access, vol. 8, pp. 36398-36410, 2020.
  28. V. V. Nair, "Drones as Futuristic Crime Prevention Strategy: Situational Review During COVID-19 Lockdown," Journal of Social Sciences, vol. 64, no. 1-3, pp. 22-29, 2020.
  29. M. Kunovjanek and C. Wankmüller, "Containing the COVID-19 pandemic with drones-Feasibility of a drone enabled back-up transport system," Transport Policy, vol. 106, pp. 141-152, 2021.
  30. D. Asamoah, D. Nuertey, B. Agyei-Owusu and I. N. Acquah, "Antecedents And Outcomes of Supply Chain Security Practices: The Role of Organizational Security Culture and Supply Chain Disruption Occurrence," International Journal of Quality & Reliability Management, vol. 39, no. 4, pp. 1059-1082, 2022.
  31. F. D. G. Solfa, "Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry," International Journal of Technology, Innovation and Management, vol. 2, no. 2, 2022.
  32. M. T. Alshurideh, E. K. Alquqa, H. M. Alzoubi, B. A. Kurdi and S. Hamadneh, "The effect of information security on e-supply chain in the UAE logistics and distribution industry,". Uncertain Supply Chain Management, vol. 11, no. 1, pp. 145-152, 2023.
  33. P. Kang, G. Song, M. Xu, T. R. Miller, H. Wang, H. Zhang, G. Liu, Y. Zhou, J. Ren, R. Zhong and H. Duan, "Low-carbon pathways for the booming express delivery sector in China," Nature Communications, vol. 12, no. 1, p. 450, 2021.
  34. J. S. Szyliowicz, "International transportation security," Review of Policy Research, vol. 21, no. 3, pp. 351-368, 2004.
  35. E. Kusrini and K. Hanim, "Analysis of compliance and supply chain security risks based on ISO 28001 in a logistic service provider in Indonesia," International Journal of Safety and Security Engineering, vol. 11, no. 2, pp. 135-142, 2021.
  36. M. Jażdżewska-Gutta and P. Borkowski, "As strong as the weakest link. Transport and supply chain security," Transport Reviews, vol. 42, no. 6, pp. 762-783, 2022.
  37. M. Pourakbar and R. A. Zuidwijk, "The role of customs in securing containerized global supply chains," European Journal of Operational Research, vol. 271, no. 1, pp. 331-340, 2018.
  38. J. Zhao, X. Liu, Q. Yan, B. Li, M. Shao, H. Peng and L. Sun, "Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning," Computers & Security, vol. 102, p. 102152, 2021.
  39. O. Pozniak and, K. Yurchenko, "Formation of the optimal business model of a logistics company," Intellectualization of Logistics and Supply Chain Management, vol. 10, pp. 19-36, 2021.
  40. N. De Liso and L. Zamparini, "Innovation, transport security and supply chains: a review," Transport Reviews, vol. 42, no. 6, pp. 725-738, 2022.
  41. L. Zamparini, "A review of models for transport security and of their relevance for supply chains," Transport Reviews, vol. 42, no. 6, pp. 784-800, 2022.
  42. F. L. Edwards and D. C. Goodrich, Introduction to transportation security., 2nd ed., Boca Raton, Florida: CRC Press, 2024.
  43. M. J. Page, J. E. McKenzie, P. M. Bossuyt, I. Boutron, T. C. Hoffmann, C. D. Mulrow, L. Shamseer, J. M. Tetzlaff, E. A. Akl, S. E. Brennan, J. G. Roger Chou, J. M. Grimshaw, A. Hróbjartsson, M. M. Lalu, T. Li, E. W. Loder, E. Mayo-Wilson, S. McDonald, L. A. McGuinness, L. A. Stewart, J. Thomas, A. C. Tricco, V. A. Welch, P. Whiting and D. Moher, "The PRISMA 2020 statement: an updated guideline for reporting systematic reviews," Systematic Reviews, vol. 10, no. 89.
  44. N. J. v. Eck and L. Waltman, "VOSviewer," Leiden University, 1 July 2024. [Online]. Available: vosviewer.com. [Accessed 30 June 2024.
  45. C. C. Aggarwal, Data Mining, New York, New York: Springer International Publishing, 2015, p. 734.
  46. A. Lei, H. Cruickshank, Y. Cao, P. Asuquo, C. P. A. Ogah and Z. Sun, "Blockchain-based dynamic key management for heterogeneous intelligent transportation systems," IEEE Internet of Things Journal, vol. 4, no. 6, pp. 1832-1843, 2017.
  47. L. A. Ajao, J. Agajo, E. A. Adedokun and L. Karngong, "Crypto hash algorithm-based blockchain technology for managing decentralized ledger database in oil and gas industry," J (Multidisciplinary Scientific Journal), vol. 2, no. 3, pp. 300-325, 2019.
  48. T. Reeb, Ed., Empowering the New Mobility Workforce: Educating, Training, and Inspiring Future Transportation Professionals, Amsterdam, Netherlands: Elsevier, 2019.
  49. K. Zavitsas, T. Zis and M. G. Bell, "The impact of flexible environmental policy on maritime supply chain resilience," Transport Policy, vol. 72, pp. 116-128, 2018.
  50. C.-M. Pintea, A. Calinescu, C. P. Sitar and P. C. Pop, ""Towards secure & green two-stage supply chain networks," Logic Journal of the IGPL, vol. 27, no. 2, pp. 137-148, 2019.
  51. H. E. Seaton, "The new e-commerce/home delivery retail distribution paradigm," Journal of Transportation Management, vol. 29, no. 1, pp. 7-25, 2018.
  52. F. Arnold, I. Cardenas, K. Sörensen and W. Dewulf, "Simulation of B2C e-commerce distribution in Antwerp using cargo bikes and delivery points," European Transport Research Review, vol. 10, no. 2, pp. 1-13, 2018.
  53. L. Urciuoli, "The risk of standards proliferation–An analysis of differences between private and public transport standards," Transportation research part A: policy and practice, vol. 116, pp. 591-602, 2018.
  54. M. Pourakbar and R. A. Zuidwijk, "The role of customs in securing containerized global supply chains," European Journal of Operational Research, vol. 271, no. 1, pp. 331-340, 2018.
  55. X. Tong, C. K. Lo, K.-h. Lai and T. C. E. Cheng, "Supply chain security management: a citation network analysis," International Journal of Shipping and Transport Logistics, vol. 11, no. 6, pp. 508-532, 2019.
  56. A. Sidebottom, A. Thornton, L. Tompson, J. Belur, N. Tilley and K. Bowers, "A systematic review of tagging as a method to reduce theft in retail environments," Crime science, vol. 6, no. 7, pp. 1-17, 2017.
  57. A. Khaslavskaya and, V. Roso, "Outcome-driven supply chain perspective on dry ports," Sustainability, vol. 11, no. 5, p. 1492, 2019.
  58. D. T. Fokum, V. S. Frost, M. Kuehnhausen, D. DePardo, A. N. Oguna, L. S. Searl, E. Komp, M. Zeets, D. D. Deavours, J. B. Evans and G. J. Minden, "An open-system transportation security sensor network: Field-trial experiences," IEEE transactions on vehicular technology, vol. 59, no. 8, pp. 3942-3955, 2010.
Figure 1. Depiction of how transport security relates to supply chains.
Figure 1. Depiction of how transport security relates to supply chains.
Preprints 111699 g001
Figure 2. Algorithmic workflow to identify and visualize themes.
Figure 2. Algorithmic workflow to identify and visualize themes.
Preprints 111699 g002
Figure 3. Keyword network of the filtered corpus.
Figure 3. Keyword network of the filtered corpus.
Preprints 111699 g003
Figure 4. Word cloud of keywords from articles published in the pre- and post-COVID cohort.
Figure 4. Word cloud of keywords from articles published in the pre- and post-COVID cohort.
Preprints 111699 g004
Figure 5. Top bigrams from articles published in the pre-COVID cohort.
Figure 5. Top bigrams from articles published in the pre-COVID cohort.
Preprints 111699 g005
Figure 6. Top bigrams from articles published in the post-COVID cohort.
Figure 6. Top bigrams from articles published in the post-COVID cohort.
Preprints 111699 g006
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Copyright: This open access article is published under a Creative Commons CC BY 4.0 license, which permit the free download, distribution, and reuse, provided that the author and preprint are cited in any reuse.
Prerpints.org logo

Preprints.org is a free preprint server supported by MDPI in Basel, Switzerland.

Subscribe

© 2024 MDPI (Basel, Switzerland) unless otherwise stated