international journal of physical distribution & logistics …€¦ · international journal of...
TRANSCRIPT
International Journal of Physical Distribution & Logistics ManagementThe impact of supply chain security practices on security operational performance among logisticsservice providers in an emerging economy: security culture as moderatorSuhaiza Hanim Zailani Karthigesu Seva Subaramaniam Mohamad Iransmanesh Mohd Rizaimy Shaharudin
Article information:To cite this document:Suhaiza Hanim Zailani Karthigesu Seva Subaramaniam Mohamad Iransmanesh Mohd Rizaimy Shaharudin , (2015),"Theimpact of supply chain security practices on security operational performance among logistics service providers in anemerging economy: security culture as moderator", International Journal of Physical Distribution & Logistics Management,Vol. 45 Iss 7 pp. -Permanent link to this document:http://dx.doi.org/10.1108/IJPDLM-12-2013-0286
Downloaded on: 13 June 2015, At: 19:07 (PT)References: this document contains references to 0 other documents.To copy this document: [email protected] fulltext of this document has been downloaded 1 times since 2015*
Access to this document was granted through an Emerald subscription provided by emerald-srm:376953 []
For AuthorsIf you would like to write for this, or any other Emerald publication, then please use our Emerald for Authors serviceinformation about how to choose which publication to write for and submission guidelines are available for all. Pleasevisit www.emeraldinsight.com/authors for more information.
About Emerald www.emeraldinsight.comEmerald is a global publisher linking research and practice to the benefit of society. The company manages a portfolio ofmore than 290 journals and over 2,350 books and book series volumes, as well as providing an extensive range of onlineproducts and additional customer resources and services.
Emerald is both COUNTER 4 and TRANSFER compliant. The organization is a partner of the Committee on PublicationEthics (COPE) and also works with Portico and the LOCKSS initiative for digital archive preservation.
*Related content and download information correct at time of download.
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
The Impact of Supply Chain Security Practices on Security Operational
Performance among Logistics Service Providers in an Emerging Economy:
Security Culture as Moderator
Introduction
Supply chain security management is vital to support the organization in safely achieving its business
goals and objectives (Sarathy, 2006). Closs and McGarrell (2004, p.8) defined supply chain security
management as “the application of policies, procedures, and technologies to protect supply chain
assets (products, facilities, equipment, information, and personnel) from theft, damage, or terrorism,
and to prevent the introduction of unauthorized contraband, people, or weapons of mass destruction
into the supply chain”. According to Martin et al. (2011), supply chain security management is
currently perceived to be an important area in managing business risk. Organizations are giving
greater attention to security by spending more money, time, and resources to ensure that security
exists in their supply chain as unexpected incidents may cause tangible and intangible damage in
terms of property, products, infrastructure, people, reputation, market position, goodwill and brand
(Securitex, 2008; Deloitte, 2005). Although many companies are devoting increased resources and
attention to security efforts, little guidance is available to firms seeking to minimize their exposure to
unexpected and potentially damaging or disruptive occurrences affecting their supply chains.
It may well be the case that cargo thefts are a great challenge for multinational companies as
their products are flowing globally. Malaysia is one of the countries in Asia that has recorded the
most frequent incidents of in-transit cargo theft with violence and threat used in cargo hijackings
(FreightWatch International, 2013). This has threatened the country image and reputation as an
industrial country is under threat among potential investors. As companies face many drawbacks due
to fragile supply chain security (Securitex, 2008), supply chain security is essential for organizations
to ensure the continuity of business (Sarathy, 2006). MIT (2006) claimed that by investing and
improving supply chain security, firms could greatly benefit and secure their supply chain effectively
by achieving a 48% reduction in inspection, 50% improvement in asset visibility, 31% shorter
problem resolution time, and 38% reduction in theft, loss and pilferage. Supply chain security is a
concern for all business organizations including those in Malaysia.
The conventional supply chain simply involved limited perspectives for protection of goods
and factories such as risk management, natural disasters, equipment and facilities failure, issues
relating to employees, loss prevention, geopolitical events, and personnel strikes (Williams, 2008; Li
and Ye, 2008). In contrast, the modern supply chain includes broader protection for supply chain
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
service providers and partners, supply chain facilities, freight carriers, people and information. The
success of modern supply chain security depends on a number of critical success factors including
organizational security culture across the upper and also lower streams of the supply chains. The
security culture is not only important as a part of government initiatives, but also its significant
effects on the firm’s strategic, operational and tactical objectives (Williams et al., 2009). This is
because security culture is important in the sense that it provides appropriate alertness and protection
from attacks against the supply chain management (Sheffi, 2002; Rice and Caniato, 2003;
Christopher and Peck, 2004; Sheffi, 2005b, c; Peleg-Gillai et al., 2006).
Most of the literature on supply chain security practices has been written from the perspective
and experience of developed countries (USA, Europe and Japan), and few studies have studied
supply chain security practices in the context of emerging countries like Malaysia. With the
exception of the study of Yang and Wei (2013), no other study has been found that empirically
investigates the effect of supply chain security on security performance in the South East Asian
region generally. That is, the proposed or suggested practices for managing supply chain security
have not been validated in emerging countries. Furthermore, despite its importance, little or no
research exists concerning how security culture in countries, such as Malaysia, may affect the
relationship between supply chain security practices and security performance. As a result, little is
known about how security culture influences the scope and deployment of supply chain security
activities and thereby differentiates firm security performance. It is important to bear in mind that the
organizational culture for companies in Asia (including Malaysia) is totally different from companies
in other countries (Cullen et al., 2004; Morris et al., 1998). Because of the continuing increase in
global competition, regardless of whether manufacturing firms act proactively or reactively, an
investigation of the role of security culture offers substantial value to practitioners. In addition, an
investigation of the role of security culture may refine our conceptual understanding of the linkages
between supply chain security practices and performance, especially in the context of developing
countries.
To summarize, in an attempt to partially address the lack of empirical research, this study
aims to investigate the effect of supply chain security practices on security operational performance
by considering security culture as a moderator. This study hopes to provide primary guidelines for
government agencies that are developing policies and strategies to ensure Malaysia is a secure
location for exporting cargo and give assurance to the local and international investors to continue
their investment. This study contributes to the literature using a theoretical foundation from the
resource-based view (RBV) of the firm to test empirically the propositions developed from past
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
studies on supply chain security. The scope of this study focuses on the human and organization
capital aspects of RBV and the perceptions of managers concerning the security operational
performance of firms. The following sections discuss the theoretical foundation and supply chain
security literature from which the research propositions are derived. Next, the survey research
methodology for data collection and the econometric model used to test the propositions are
discussed. Finally, the research findings and study implications are presented.
Literature review
Supply Chain Security Practices
The supply chain management literature provides little help in understanding supply chain security
(Closs and McGarrell, 2004; Hale and Moberg, 2005; Williams et al., 2008) and there is a gap in
academic research to address security related issues in supply chain management. Although a few
authors, such as Sheffi (2001); Gutierrez et al. (2007); Sheu et al. (2006); Closs et al. (2008); and
Hintsa et al. (2009), have discussed the importance of security initiatives in the supply chain, these
initiatives have only been discussed conceptually and have not been tested empirically. Van
Oosterhout et al. (2007) presented a case study about the Port of Rotterdam on visibility platforms
for enhancing supply chain security, in which they mentioned that a secured supply chain refers to a
supply chain in which various measures have been taken to guarantee a certain level of security
while operating.
Van Oosterhout et al. (2007) commented that there are two main categories for supply chain
security measures. The two categories are preventive measures and corrective measures. The
preventive measures consist of physical security and non-physical security, such as facilities security,
cargo security, information security and human resource management security, the preventive
measures focus on preventing the occurrence of security related risks in the supply chain, while
corrective measures focus on limiting the impact caused by security related risks. Hence, another
way for supply chain owners to protect their supply chain would be by undertaking proper corrective
action when an unpredicted crisis occurs in the supply chain. Whenever a supply chain faces a crisis,
corrective action will help firms to return to a normal state quickly. Resilience management and
business network management is an example of the corrective measures approach (Sheffi, 2005a;
Van Oosterhout et al., 2007).
Security Culture
The development of a formal or informal culture in organization can convey the norms and
behaviour, form of communication design, information practise and distribution, anticipated
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
performance and outcomes and customs (Anderson and Ackerman, 2001). As such, the
organizational culture imposes the expectation over the employee’s performance (McAfee et al.,
2002) and can be leveraged by managers as a strong tool for them to manage the employees to meet
the organization’s objectives (Tichy, 1982).
In the most general sense, the term security culture refers to the employee’s awareness,
combined with the real things that are done (Frederick, 1995). Thus, the involvement of humans in
security is highly essential; Including their participation in the development of policies and business
design that will lead to an appropriate security culture in the organization (Ekwall and Rolandsson,
2012). The spread of security culture among employees can assist the management in designing
appropriate security policies through the interaction and involvement of employees in order to
minimize the overall risk attributed by security problems. According to (Ekwall and Rolandsson,
2012), most company security programs stress on the need for high awareness among employees in
pursuance of enhancing the overall security level. Good awareness pertaining to the issue of cargo
theft must be a part of the implicit rules governing the employees conduct or in different terms, can
be known as the security culture without the direct written procedure or regulation. However,
security culture is contingent on the complexity of each company and it is imperative to have
employees that can manage security issues independently in global and complex organizations
(Ekwall and Rolandsson, 2012).
Supply Chain Security Operational Performance
Security performance can generally be assessed by hard (objective) measures and soft (perceptual or
responsive) measures (Dalton et al., 1980; Shang and Lu, 2009). Because actual incident data are
difficult to obtain and perceptual measures are valid indicators of security performance (Fawcett et
al., 1997; Shang and Lu, 2009; Voss et al., 2009), this study used perceptual-based measures to
assess the security performance of logistics services providers. Security performance is defined as
the measurement and comparison of actual levels of achievement with regard to security. It is related
to the prevention of any malicious threat, damage, and disturbance to an organization. Many studies
have identified performance indicators of security performance. Although the implementation of
security initiatives can result in additional cost, supply chain security management has several
benefits, including a reduction in theft, cybercrime, terrorism, smuggling, counterfeit goods, and
damage to goods (Gutierrez and Hintsa, 2006; Martens et al., 2011).
According to a report published by the European Commission (2007), enhancing supply
chain security can reduce theft and losses, reduce the number of delayed shipments, improve
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
planning, increase customer loyalty and employee commitment, reduce the number of safety
incidents, lower inspection costs of suppliers and increase cooperation with them, reduce crime and
vandalism, and improve security and communication between supply chain partners. Furthermore,
security management facilitates international trade by reducing transit time (Organization for
Economic Cooperation and Development, 2003; Banomyong, 2005), improving customs clearance
efficiency (Sheu et al., 2006; Peleg-Gillai et al., 2006; Diop et al., 2007), and increasing port
operational efficiency (Bichou, 2011; Yang, 2011). It also helps businesses predict the movement of
goods and lead-time, decrease the number of customs inspections, reduce the time taken to release
cargo by customs and waiting times at borders, and increase supply chain visibility (Diop et al.,
2007). To summarize, an efficient and secure supply chain can lead to higher visibility and an
increase in supply chain efficiency and customer satisfaction, reduction in lead-time and overall cost
reduction. This study used a composite measure of performance covering these dimensions to
evaluate the supply chain security operational performance, which is considered as preventing the
security performance of logistics service providers in Malaysia.
In conjunction with this, the second-order construct is used to model a level of abstraction
higher than those from first-order constructs alone. The model also captures the multidimensional
nature of security performance which security performance well because each dimension represents
some portion or aspect of the overall latent construct (security performance). Using a
multidimensional construct provides the ability to increase granularity and detail on different aspects
of a construct (Petter et al., 2007).
Theoretical background
Although SCM scholars have dedicated considerable effort to understand the relationship between
supply chain security and security performance (Voss et al., 2009; Yang, 2011; Yang and Wei, 2013)
the existing literature offers conflicting empirical findings about the performance implications of
supply chain security. Overall, the mixed results pertaining to this link suggest the need for a
contingency perspective to explain the relationship. Two important questions must be addressed to
resolve this inconclusiveness. First, practitioners need to know whether the supply chain security
practice, as a firm-specific resource, is itself a source to enhance security performance. Second,
existing research examining the supply chain security practices-performance linkage has overlooked
potential moderating variables. To answer the first question, we test the supply chain security
practices-security performance relationship in our model by considering supply chain security
practices as an antecedent mechanism that aids in the translation of security resources into
performance. More specifically, we posit that a supply chain wide emphasis on security has a
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
positive impact on firm security performance. In response to the second query, this study investigates
security culture as a moderator in supply chain security practices-security performance research to
help derive guidelines for firms seeking to improve their performance through supply chain security.
This research is explicitly grounded on the theoretical foundation of the RBV. The RBV
theory is useful to investigate the relationship between the internal organizational capabilities and the
service provider’s performance (Barney et al., 2001). In the RBV theory, resources are all the
tangible and intangible assets that firms use to conceive and implement their strategies (Wernerfelt,
1984; Rumelt, 1984; Barney et al., 2001). The RBV theory has three important constructs –
resources, capability, and competencies (Yang et al., 2009). The RBV of the firms suggests that
combining resources, including cargo, facilities, information, and humans can generate unique and
hard-to-imitate capabilities that contribute to supply chain security performance. The firms that can
manage their resources and capabilities in a supply chain more efficiently are likely to gain
competitive performance (Dangayach and Deshmukh, 2001). The supply chain security practices are
the capabilities which are distributed heterogeneously across firms and cannot be transferred from a
firm to another without cost. Therefore, successful supply chain security requires adaptation of the
RBV because the resources and capabilities are two valuable factors for supply chain security”
(Martens et al., 2011).
Security measures will help to protect firms from any unexpected supply chain incidents and
work as a detection system for supply chain players in the case of any disaster. Typically, companies
pursue security initiatives to protect their supply chain. Hintsa et al. (2009) grouped security
measures into four categories, namely, cargo management, facility management, human resource
management, and information management, which are used in the current study as independent
variables. The independent variables of the current study (Figure 1) are mainly related to resources
and are fully supported by the RBV theory. The cargo and facilities are the physical and tangible
assets of a service provider in the logistics industry (Javidan, 1998; Carmeli, 2004; Kaleka, 2002;
Hafeez et al., 2002) while place constitutes the resource part of the RBV theory. Information is a
firm’s source of competence (Yang et al., 2009; Hafeez et al., 2002) and human resource is a source
of knowledge, which falls in the capability part of the RBV theory.
------------------------------------------------------------
INSERT FIGURE 1 HERE
------------------------------------------------------------
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
Conceptual framework and hypotheses development
Sarathy (2006) posited that security measures impose high cost on firms during implementation, but
that they give long-term benefit for firms by improving the overall performance of the supply chain.
Bearing (2003), a consultation firm, undertook a study of the financial impact between shippers and
customers from Thailand and the United States by implementing a secure supply chain management
system. The report studied the benefits to the service providers, for which the results show that there
is a relationship between security initiatives and financial performance. The security efforts led to
certain financial benefits: (i) better visibility on cargo arrival timeline and cargo monitoring, (ii)
avoidance of cost on US Customs’ trade security measures, (iii) reduction in size of inventory, (iv)
increase in sales, and (v) reduction in theft and pilferage. Peleg-Gillai et al. (2006) also studied the
security measures that lead to organizational performance if security implementation is undertaken in
a proactive rather than reactive manner.
To guide the development of our conceptual framework, we depict the key constructs in
Figure 1. On the basis of our literature review, we propose that supply chain security practices and
security culture play different roles in contributing to firm security operational performance. We
propose that supply chain security practices encompassing cargo management, facility management,
human resource management, and information management relate to firm security operational
performance, such as higher visibility increase in supply chain efficiency and customer satisfaction,
reduction in lead-time and overall cost reduction. We further propose, that security culture influences
the relationship between supply chain security and security operational performance. The following
sections provide a brief review of the literature pertaining to each practice. In addition, research
propositions suggested by the literature are offered.
Cargo Management and Security Operational Performance
Cargo management refers to protecting the cargo during all the steps of the manufacturing, shipping
and transport processes (Hintsa et al., 2009). Organizations implement security measures to protect
the supply chain against potential risk (Closs et al., 2008). Cargo is one of the major sources of
security concerns in the supply chain (Sarathy, 2006). The common security issues while handling
cargo are theft, which causes a great disturbance in the supply chain (Chapman et al., 2002; Ekwall,
2009). The trend for cargo theft in Asia is increasing rapidly, and Malaysia and the Philippines have
the highest cargo theft cases among all the countries in Asia (FreightWatch International Global
Assessment, 2011). In order to protect cargo throughout the logistic activities, cargo management is
needed as a security practice by the service provider in the logistics industry (Gutierrez and Hintsa,
2006). Cargo related incidents could impact firm performance and cause tangible and intangible
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
damage to an organization (Securitex, 2008). Bearing (2003) stated that among the security efforts
firms can obtain through physical security initiatives are better visibility of the cargo arrival timeline
and cargo monitoring. Since security is a new topic, firms may have a lack of exposure to understand
how security initiatives will have a positive effect on security performance (Voss et al., 2009).
Hence, the following hypothesis is formed:
H1: Cargo Management positively affects supply chain security operational performance.
Facility Management and Security Operational Performance
Facility management refers to the integrated management of the workspace to enhance the
performance of the organization (Tay and Ooi, 2001) by guaranteeing the security of the facilities
where the cargo is stored and handled (Hintsa et al., 2009). Optimal warehouse/terminal layout
designing (e.g. entry/exit controllability; clearly marked control areas; sufficient lighting conditions)
and efficient facility monitoring (e.g. 24-hour camera system, security guards, filming activities of
loading containers, and picking) are the most common facility management practices (Hintsa et al.,
2009). Protection of the facility is needed as many valuable resources, products, cargo and important
information are stored in a firm’s facility and any security related disaster may affect the
performance and operating environment of the firm. Hence, the following hypothesis is drawn:
H2: Facility Management positively affects supply chain security operational performance.
Human Resource Management and Security Operational Performance
Employee screening and hiring practices are one of the important aspects in supply chain security
(Rice and Caniato, 2003). Employees with low loyalty to the firm may undertake intentional acts of
sabotage and impair the performance of the firm (Lensing, 2003). By practicing proper screening and
hiring (e.g. background checks; interviews for leaving or employees who have been fired), firms can
prevent hiring employees who have the potential for being an enemy to their own supply chain
(Hintsa et al., 2009). Human resource management guarantees trustworthiness and security
awareness of all personnel in direct and indirect contact with cargo and other company assets (Hintsa
et al., 2009). Therefore, the current study hypothesizes that:
H3: Human Resource Management positively affects supply chain security operational performance.
Information Management and Security Operational Performance
Information serves as the basis for decision-making and generates value for organizations. Improper
management of information may lead to irreparable damage to organizations (Michelberger and
Labodi, 2009). Information pertaining to a firm’s business activities and transactions are usually
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
shared with supply chain partners and protecting this information from outside intruders or
competitors is critical for the success of firms in the competitive market (Kolluru and Meredith,
2001). Hence, service providers in the logistics industry must have proper security measures to
protect the information. Hintsa et al. (2009) defined information management from the supply chain
security management perspective as protecting critical business data and exploiting information as a
tool for detecting illegal activities and preventing security breaches. Having complete information
about supply chain activities, both downstream and upstream, also helps to avoid security breaches
and protects all the other members in the supply chain. Thus, we set the following hypothesis:
H4: Information Management positively affects supply chain security operational performance.
Moderating Effect of Security Culture
Supply chain researchers rely on the importance of understanding organizational culture. Tan et al.
(1998) suggested that organizational culture is one of the most critical elements for supply chain
members to grasp as they seek to optimize the performance of their overall system and their
individual firm acting within it. On the other hand, according to Williams et al. (2009), the
implementation of security is the culture of the organization in respect of the way that security
interacts with the organization’s employees in terms of sustainable norms and expectations.
Although supply chain security research is still in its infancy stage, researchers in the area of
security of supply chains have begun to incorporate the effects of organizational culture (Closs and
McGarrell, 2004; Hale and Moberg, 2005; William et al., 2009). Sheffi (2005c) claimed that the
most important element of security in the supply chain is culture: the building of a security culture is
a cooperative initiative between the employees and management. In conjunction with this, Autry and
Bobbitt (2008) investigated the behaviour of employees towards security practices as they performed
their daily tasks and found that firms with security-oriented employees may enjoy several
organizational performance advantages. This supports the argument of other researchers that supply
chain security practices are related to the importance of human attitude, HR practices, and other
employee-level effects on organizational performance (Christopher and Peck, 2004; Closs et al.,
2008; Rice and Spayd, 2005; Sheffi, 2002; 2005b). By establishing a security culture among the
workers at the base level through the delegation of authority, the protection of supply chains will be
at its highest level and able to handle and solve any security issue in the supply chain (Autry and
Bobbitt, 2008). It suggests that, security culture creates an opportunity for firms to safeguard their
supply chain operations and will help firms to implement security initiatives more effectively, thus it
is expected that the existence of a higher security culture enhances the positive effect of security
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
initiatives practices on supply chain security operational performance. Hence, the following
hypotheses are developed:
H5: Security culture moderates positively the effects of (a) cargo management, (b) facility
management, (c) human resource management, and (d) information management on supply chain
security operational performance.
Research Methodology
Sample and Data Collection
The unit of analysis for this study is service provider firms in the logistics industry that operate in
Malaysia. In Malaysia, the service providers in the logistics industry are divided into two categories
– Transport Service Provider and Service provider. In this study, the unit analysis will cover both
types of service provider in the logistics industry. Questionnaires were mailed to 800 target
respondents who hold executive positions or higher in the service provider firms. The firms were
selected from the Malaysia logistics directory 2011/2012. Out of 226 responses received, five of the
responses were partially completed, fifteen were discarded in data cleaning, resulting in an effective
response rate of 25.75% (206/800). Considering the length of the survey, this response rate is quite
satisfactory and compares favourably with other empirical studies in supply-chain management
(Stanley & Wisner, 2001; Chen et al., 2004). The final sample consisted of 20 (9.7%)
owners/CEOs/directors, 138 (67.0%) senior managers/managers, and 48 (23.3%) executives. The
distribution mainly focused on Freight Forwarders (31.9%), 3rd Party Logistics Companies (20.9%),
Container Shipping Companies (14.5%), and Container Shipping Agencies (10.9%). In terms of the
number of employees in the firm, the data indicated that 57.3% of the firms have less than 50
employees.
Measures of Constructs
This study employed a quantitative survey with a structured questionnaire. To develop measurement
items, processes recommended by several authors in the literature was followed (Bienstock et al.,
1997; Churchill, 1979; Gerbing and Anderson, 1988): (1) item generation through literature review;
(2) academic expert review; (3) debriefing with industry experts; and (4) item purification in the
empirical study.
First, we adapt measurement items relevant to the construct, based on prior literature. Table 1
summarizes the measurement items for each of the practices of supply chain security. The survey
used a five-point Likert scale (1 = “strongly disagree,” 5 = “strongly agree”) for supply chain
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
security practices whereas for questions relating to the moderator and dependent variable, we used (1
= “very low extent,” 5 = “very high extent”). Items for Cargo Management, Facility Management,
Inventory Management and Human Resource Management were mainly adopted from Hintsa et al.
(2009), Knight (2003), Gutierrez et al. (2007) and Urciuoli (2010). Whereas for items for security
culture were adopted from Voss et al. (2009), Williams et al. (2009) and Rinehart et al. (2004).
Items for supply chain security operational performance were adopted from Peleg-Gillai et al. (2006),
which comprised cargo safety, supply chain visibility, supply chain efficiency, and supply chain
resilience.
Six experienced researchers were asked to review the questionnaire for ambiguity, clarity,
and appropriateness of the items used to operationalize each construct (DeVellis, 1991). These
researchers were also asked to assess the extent to which the indicators sufficiently addressed the
subject area (Dillman, 1978). Based on the feedback received from these researchers, the instrument
was modified to enhance the clarity and appropriateness of the measures purporting to tap the
constructs. Then, the survey instrument was mailed to seven supply chain security managers. These
managers were asked to review the questionnaire for structure, readability, ambiguity, and
completeness. The final survey instrument incorporated feedback received from these managers,
which enhanced the clarity of the instrument. Finally, the scale purification was iterative through the
empirical test. This process yielded a survey instrument that was judged to exhibit high content
validity.
Analysis
This study applies Partial Least squares (PLS) using SmartPLS 2.0 (Beta) M3 (Ringle et al., 2005).
We then applied nonparametric bootstrapping (Efron and Tibshirani, 1993; Wetzels et al., 2009) with
5000 replications as suggested by Hair et al. (2013). This technique has been used due to its
appropriateness to the exploratory nature of this study where the moderating effect of security culture
have not been previously tested.
The two-step approach was utilized in data analysis, as suggested by Hair et al. (2013). The
first step involves the analysis of the measurement model, while the second step tests the structural
relationships among the latent constructs. The two-step approach aims at establishing the reliability
and validity of the measures before assessing the structural relationship of the model.
Results
Common methods variance
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
According to Podsakoff and Organ (1986), common method bias is problematic when a single latent
variable accounts for the majority of the explained variance. The results of un-rotated factor analysis
indicate that the first normalized linear combination only explains 39.54% of the total 79.22%
variance, indicating that common method bias was not a serious problem in the study.
Measurement Model Results
The PLS test of the measurement model has three primary aspects: (a) individual item reliability, (b)
internal consistency of the entire scale, and (c) discriminant validity. Individual item reliability was
assessed by examining the factor loadings of each measure on its corresponding construct. Hair et al.
(2010) suggested accepting items with loadings of at least 0.6. Since the loadings associated with
each of the scales were all greater than 0.6 (Table 1), individual item reliability is acceptable.
The construct internal consistency was assessed using composite internal scale reliability,
which is similar to Cronbach’s alpha. All nine latent variables satisfy the Hair et al. (2010)
guidelines of at least 0.7 for internal consistency (Table 1). Internal consistency can also be
evaluated using the average variance extracted (AVE), which is a measure of variance accounted for
by the underlying variable. The present study has an AVE of above 0.5 for all variables, satisfying
the criterion of Fornell and Larcker (1981) and providing further support of the internal consistency
(Table 1).
------------------------------------------------------------
INSERT TABLE 1 APPROXIMATELY HERE
------------------------------------------------------------
We used two approaches to assess the discriminant validity of the constructs. First, we examined the
cross-loading of the indicators, which revealed that no indicator loads higher on an opposing
construct (Hair et al., 2012). Second, we applied the criterion of Fornell and Larcker (1981) and
tested whether each construct’s AVE is greater than its squared correlation with the remaining
constructs (Table 2). Both analyses confirm the discriminant validity of all constructs.
------------------------------------------------------------
INSERT TABLE 2 APPROXIMATELY HERE
------------------------------------------------------------
We applied the repeated indicators approach for second-order constructs on security operational
performance. As suggested by Hair et al. (2013), the same measurement model evaluation criteria
(with the exception of discriminant validity between second-order constructs and their particular
first-order constructs) were applied to the high-order component, and the internal consistency
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
reliability and convergent validity was established, as shown in Table 3. All the lower-order
constructs (LOCs) significantly (p<0.001) affect security operational performance. The CR and the
AVE of the second-order construct met the criteria for reliability and convergent validity.
Assessment of the structural model
With the satisfactory results in the measurement model, this study subsequently evaluated the
structural model to confirm the relationships among constructs via the PLS (partial least squares)
method. The explanatory power of the research model was examined in terms of the total explainable
variation of the model. The results suggest that the model is capable of explaining 69.9% of the
explainable variation on security operational performance. The effect size of f2 was computed using
the following formula: f2 = (R2included – R2excluded) / (1- R
2included). The f
2 analysis complements R2 in
that the effect size of the impact of specific latent variables on the dependent latent variables can be
examined (Chin, 2010). Among the security initiative practices, cargo management has the highest
effect size (f2 = 0.146) on security operational performance, whereas facility management has the
lowest (f2 = 0.047). Besides estimating the magnitude of R
2, researchers have recently included the
predictive relevance developed by Stone (1974) and Geisser (1975), as an additional assessment of
model fit. This technique represents the model adequacy to predict the manifest indicators of each
latent construct. The Stone-Geisser Q2 (cross-validated redundancy) was computed to examine the
predictive relevance using the blindfolding procedure in PLS.
Following the guidelines suggested by Chin (2010), a Q2 value of greater than zero implies
that the model has predictive relevance, and, in the present study, a value of 0.384 was obtained,
which is greater than zero. We applied nonparametric bootstrapping (Efron and Tibshirani, 1993;
Wetzels et al., 2009) with 5,000 resamples to test the structural model. The significance and relative
strength of direct effects specified by the research model were evaluated (Table 3, Figure 2). The
results reveal that all paths are positively significant; and, therefore, H1-H4 are supported. Our
findings suggest that cargo management, facility management, human resource management, and
information management collectively measured a higher order of supply chain security practices.
------------------------------------------------------------
INSERT TABLE 3 APPROXIMATELY HERE
------------------------------------------------------------
------------------------------------------------------------
INSERT FIGURE 2 APPROXIMATELY HERE
------------------------------------------------------------
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
The product indicator approach (mean-centred) was employed to create the interaction construct
(Hair et al., 2013). The CR and the AVE of the interaction constructs met the criteria for reliability
and convergent validity. The results indicate that only the interaction of facility management and
security culture (β=0.088, p<0.05) has a positive significant effect on security operational
performance. As such, H5b is supported, whereas H5a, H5c, and H5d are not supported.
------------------------------------------------------------
INSERT TABLE 4 APPROXIMATELY HERE
------------------------------------------------------------
Figure 3 illustrates that security culture strengthens the effect of facility management on security
operational performance. With low security culture, high and low facility management practices have
no different effect on security performance. This indicates that facility management practices are
effective when the security culture is high.
------------------------------------------------------------
INSERT FIGURE 3 APPROXIMATELY HERE
------------------------------------------------------------
Discussion and implications
The purpose of the present study is to identify the relationship between supply chain security
practices and the security operational performance of service provider firms in the logistics industry
in Malaysia and the effect of security culture on the relationships between security practices and the
security operational performance. Our findings suggest that cargo management, facility management,
human resource management, and information management have a positive and significant effect on
supply chain security operational performance. Moreover, the moderating impact of security culture
was only confirmed by the relationship between facility management practices and supply chain
security performance.
The significant relationship between cargo management and supply chain security operational
performance is in line with the studies conducted by Securitex (2008) who claimed that cargo related
incidents could negatively impact on firm performance. This result balances well with what has
occurred in Malaysia over the past two decades. According to FreightWatch International Global
Assessment (2011), Asia is rated with a moderate level of cargo theft risk; however, the same report
mentions that the trend of cargo theft in Asia has shown a marked increase. Among all the countries
in Asia, Malaysia and the Philippines are reported as having a higher number of cargo theft cases
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
(FreightWatch International, 2013). Another source, the US Daily (2011), quoted that goods worth
US$22.7 million (RM68.9 million) were stolen from Malaysian ports, airports, warehouses, and
trucks between 2007 and 2010. Malaysia is recognised as a location for multinational companies
operating their manufacturing plants for high technology products, while, at the same time, Malaysia
is one of the riskiest countries in Asia with a high rate of cargo theft (FreightWatch International,
2011; 2013). Cargo theft in Malaysia occurs while the cargo is in transit and while it is stored in the
warehouse. Therefore, it is not surprising that, among supply chain security practices, cargo
management has the highest impact on supply chain security operation among logistics service
providers in Malaysia.
Facility management is also significantly related to the supply chain security operation. This
indicates that the storage areas of the cargo and products, and premises with security guards, CCTV
monitoring, physical obstacles to avoid theft, proper identification of entry and exit areas, periodic
inspection to ensure integrity of security measures, will improve the operational security of the
logistics service providers. In addition, this study highlighted the role of the human resource
management concerning supply chain operational security of logistics service providers. This result
is consistent with Rice and Caniato (2003) who found that employee screening and hiring practices
are important aspects of the supply chain security operation. This proves the importance of human
intervention for improving the operational security of service providers in the logistics industry. All
security related practices are carried out by the firms’ employees. Employees are the people who
enforce the security practices in a firm. During the hiring process, firms’ security policies and
practices will be exposed to employees during the initial stage of their employment. In order, to
achieve higher operational security, firms need to hire employees who are sensitive to security issues
and will not take advantage at any point of time. Employees working in the logistics firms must be
trustworthy and responsible (Mayhew, 2001; Ekwall, 2009) and new employees entering the firms
must go through a proper reference check by the management team (Mayhew, 2001; Ekwall, 2009)
because these employees will handle cargo worth millions of dollars for which safety becomes the
main priority.
Moreover, the results also showed that information management has a significant impact on
supply chain operational security. This result is consistent with Michelberger and Labodi (2009),
who also found a significant relation between information management and the operational security
of an organization. Critical information needs to be protected and safeguarded during disruption so
that firms can quickly recover to continue operation; hence, firms must have a backup system to keep
information about the customer, supplier, process, procedures and intellectual property safely. Rice
and Caniato (2003) suggested having an IT system to protect data loss, setting up and operating a
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
parallel IT system, using a range of communication tools and having a business continuity plan as
preparation to respond and restore operations whenever an unexpected event takes place in the
supply chain.
As mentioned by Voss et al. (2009), to ensure complete coverage of supply chain security,
firms must employ both internal and external strategies. Therefore, a security culture is essential for
the implementation of security initiatives and for better supply chain security operational
performance. Thus, the study predicted that the existence of a security culture as a moderator would
enhance the positive effects of security initiatives on the operational performance of supply chain
security. The results show that security culture just moderate the relationship between facility
management and the supply chain security operational performance. This result implies that, by
having a stronger security culture among the employees, the effect of facility management on
security operational performance will be higher. Hence, it is crucial for managers of service provider
firms in the logistics industry to do the necessary work to enhance the employees vigilance toward
supply chain security, to create a supply chain security-focused workplace, and make supply chain
security a norm for all employees.
The reason why most of the hypotheses are not supported when the moderator is present
could be because security culture is in the initial stage of implementation among supply chain service
providers in Malaysia and many firms only practice internal strategies. This reason is similar to the
reason that is highlighted by Rice & Caniato (2003) who stated whereby many firms attempt to
practice internal strategies but only limited companies practice both of internal and external
strategies. They suggest that before practicing any supply chain security initiatives, the
organizational culture needs to be enhanced. The difference between the levels of security culture
among logistics service providers in Malaysia is low and its moderating role cannot be captured.
Therefore, for future study, the moderating role of security culture needs to be investigated in
developed countries.
This study illustrates many implications for the supply chain managers and policymakers,
which, if adopted, will enable supply chain firms to manage and deliver their respective customer’s
products to the final destination without any disruption. The significance of cargo management,
facility management, human resource management, and information management suggests that
policymakers in Malaysia should set appropriate policies and incentives to encourage businesses to
adopt supply chain security practices. When properly designed, these measures can encourage firms
to innovate and create new solutions to become safer and directly affect the security operational
performance. In addition, the findings of this study assist supply chain managers and logisticians to
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
re-examine their existing supply chain security model by considering the selected supply chain
security practices, which have a significant impact on supply chain security operational performance.
Managers should take security issues into account in planning organizational strategies and provide
strong and consistent support to the overall security program (Ruighaver et al., 2007) in order to
create a supply chain security-focused workforce. In conclusion, individual firms need to strategize
their business model with the inclusion of security aspects, which will surely create a competitive
advantage over other players in the logistics industry.
This study uses RBV as a theoretical lens, to investigate supply chain security operational
performance based on RBV. The study provides an empirical test of the theory in the supply chain
security context. From an academic perspective, our research specially developed the concept of
supply chain security operational performance by recognizing the role of resources and capabilities
in security operational performance.This study has extended previous research conducted in
developed countries and provides great potential by advancing the understanding between the supply
chain security practices and security operational performance amongst Malaysia’s service providers
in the logistic industry. This research has also contributed to the literature by examining the
moderating effects of the security culture on the relationship between supply chain security practices
and operational performance. To the best of our knowledge, our research is the first study to conduct
such a theoretical and empirical examination.
Conclusions, limitations, and further research
As supply chains become increasingly global, firms will be forced to adopt strategies for the secure
flow of goods from raw material to end consumer. Furthermore, security-related issues are frequently
uppermost in the minds of many end consumers, and will require all supply chain members to take a
fresh look at the security measures. In response to the importance of security issues in supply chain
and the far limited discussion regarding its operational performance in developing countries, the
study developed a research model and evaluated its empirical validity and explanatory usefulness by
using a survey study that involved Malaysia’s service providers in the logistic industry. The study’s
overall data analysis results support the research model, which showed reasonable statistical
significance and classification accuracy. Moreover, findings of the study suggest that cargo
management, facility management, human resource management, and information management have
a significant impact on supply chain security operational performance. The results also confirmed the
moderating role of security culture on the relationship between facility management practices and
supply chain security performance.
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
There are certain limitations that need to be taken into account for generalizing the results of
this study. One limitation is that, the study tested and verified the hypotheses with a questionnaire
survey and only provided a cross-section of the study in nature. Therefore, it limits the ability to
imply causality in the relationships among the variables. Thus, the result of the survey will be
affected by the fact that this study cannot observe the dynamic change of security operational
performance in the process of the development of supply chain security practices. As such, a
longitudinal study should be attempted, that examines the relationships for an extended period of
time to be able to provide more precise results. Furthermore, this study used a survey sample limited
to the Malaysia’s service providers in the logistics industry. However, the effect of the security
practices on operational performance and security culture might be different between countries. In
addition, small firms make up a large portion of the sample that may not have formal, or the
wherewithal to have formal human resource management, information management, and facility
management. Thus, future research could test the research model of this study in different countries
and collect data from big firms. Another limitation of this study would be the respondent firm’s
customer base, which will be different for each firm. Different customer bases, such as electronic and
electrical, plastic and packaging, chemical, metal, and others will present their own security concerns
for their products. Therefore, different respondents serving different customer bases will have
different opinions about the questionnaires forwarded to them. This study does not cover the security
initiatives implemented by the government; hence, presenting a limitation and the need for a more
structured study among the service providers in the logistics industry. In addition, security culture
may also be an antecedent to the supply chain security practices; therefore, future studies could test
the security culture as an antecedent.
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
References
Anderson, D. and Ackerman, A.L. (2001), Beyond Change Management: Advanced Strategies for
Today’s Transformational Leaders, Jossey-Bass/Pfeiffer, San Francisco, CA.
Autry, C.W. and Bobbitt, L.M. (2008), “Supply chain security orientation: conceptual development and a proposed framework”, The International Journal of Logistics Management, Vol. 19 No. 1, pp. 42-64.
Banomyong, R. (2005), “The impact of port and trade security initiatives on maritime supply-chain management”, Maritime Policy & Management, Vol. 32 No. 1, pp. 3-13.
Barney, J.B., Wright, M. and Ketchen, D. (2001), “The resourced-based views of the firms: ten years after 1991”, Journal of Management, Vol. 27 No. 6, pp. 625-641.
Bearing (2003), Asia-Pacific economic cooperation STAR-BEST project cost-benefit analysis,
Business and System Aligned.
Bichou, K. (2011), “Assessing the impact of procedural security on container port efficiency”, Maritime Economics & Logistics, Vol. 13 No.1, 1-28.
Bienstock, C.C., Mentzer, J.T. and Bird, M.M. (1997), “Measuring Physical Distribution Service Quality”, Journal of the Academy of Marketing Science, Vol. 25, No. 1, pp. 31-44.
Carmeli, A. (2004), “Assessing core intangible resources”, European Management Journal, Vol. 22 No.1, pp. 110-122.
Chapman, P., Christopher, M., Juttner, U. and Peck, H. (2002), “Identifying and managing supply chain vulnerability”, Logistics & Transport Focus, Vol. 4 No.4, pp. 59-64.
Chen, I.J., Paulraja, A. and Ladob, A.A. (2004), “Strategic purchasing, supply management, and firm performance”, Journal of Operations Management, Vol. 22 No. 5, pp. 505-523.
Chin, W.W. (2010), “How to write up and report PLS analyses”, In Vinzi, V.E., Chin, W.W., Henseler, J. and Wang, H. (Eds.), Handbook of Partial Least Squares: Concepts, Methods and
Applications in Marketing and Related Fields (pp. 655–690), Berlin: Springer.
Christopher, M. and Peck, H. (2004), “Building the resilient supply chain”, International Journal of
Logistics Management, Vol. 15 No. 2, pp. 1-14.
Churchill, G.A. (1979), “A Paradigm for Developing Better Measures of Marketing Construct”, Journal of Marketing Research, Vol. 16, No. 1, pp. 64-73.
Closs, D.J. and McGarrell, E.F. (2004), “Enhancing Security throughout the Supply Chain”, Special Report to the IBM Center for the Business of Government.
Closs, D.J., Whipple, J. and Voss, M.D. (2008), “A framework for protecting your supply chain”, Supply Chain Management Review, Vol. 12 No. 2, pp. 38-45.
Cullen, J.B., Parboteeah, K.P. and Hoegl, M. (2004), “Cross-national differences in managers willingness to justify ethically suspect behaviors: a test of institutional anomie theory”, Academy of Management Journal, Vol. 47 No. 3, pp. 411–421.
Dalton, D.R., Todor, W.D., Spendolini, M.J., Fielding, G.J. and Porter, L.W. (1980), "Organization structure and performance: A critical review," Academy of Management Review, Vol. 5 No. 1, pp. 49-64.
Dangayach, G.S. and Deshmukh, S.G. (2001), “Manufacturing strategy: literature review and some issues”, International Journal of Operations & Production Management, Vol. 21 No. 7, pp. 884-932.
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
Deloitte (2005), Prospering in the Secure Economy, A Deloitte Research Study, USA.
DeVellis, R.F. (1991), Scale Development: Theory and Applications, Sage Publications, Newbury Park, CA.
Dillman, D.A. (1978), Mail and Telephone Surveys: the Total Design Method, New York: Wiley.
Diop, A.D., Hartman, D. and Rexrode, D. (2007), C-TPAT: Cost/Benefit Survey, Report by Center for Survey Research, University of Virginia.
Efron, B. and Tibshirani, R.J. (1993), An Introduction to the Bootstrap, New York: Chapman & Hall.
Ekwall, D. (2009), :The displacement effect in cargo theft”, International Journal of Physical
Distribution & Logistics Management, Vol. 39 No. 1, pp. 47-62.
Ekwall, D. and Rolandsson, B. (2012), “Security aspects on corporate culture in a logistics terminal setting”, Journal of Transportation Security, Vol. 6 No. 1, pp. 13–25.
European Commission (2007), European Parliament’s Committee on Transport and Tourism, Organized theft of commercial vehicles and their loads in the european union, European Parliament, Brussels
Fornell, C. and Larcker, D.F. (1981), “Evaluating structural equation models with unobservable variables and measurement error”, Journal of Marketing Research, Vol. 18 No. 1, 39–50.
Frederick, W.C. (1995), Values, Nature, and Culture in the American Corporation, Oxford University Press, New York, NY
FreightWatch International (2011), FreightWatch International Global Threat Assessment 2011. Available at: http://www.transportschaden.biz/html/documents/FreightWatch_Global_Threat_Assessment_2011.pdf (accessed 14 June 2013).
FreightWatch International (2013), 2013 Global Cargo Theft Threat Assessment. Available at: http://www.rx360.org/LinkClick.aspx?fileticket=DO4GmGitjDU%3D&tabid=355 (accessed 18 June 2014).
Geisser, S. (1975), “The predictive sample reuse method with applications”, Journal of the
American Statistical Association, Vol. 70 No. 350, pp. 320–328.
Gerbing, D.W. and Anderson, J.C. (1988), “An Updated Paradigm for Scale Development Incorporating Unidimensionality and Its Assessment,” Journal of Marketing Research, Vol. 25, No. 2, pp. 186-192.
Gutierrez, X. and Hintsa, J. (2006), “Voluntary supply chain security programs: A systematic comparison”, The International Conference of Information Systems, Logistics and Supply
Chain, Lyon, France.
Gutierrez, X., Hintsa, J., Wieser, P. and Hameri, A.P. (2007), “Voluntary supply chain security program impacts: an empirical study with BASC member companies”, World Customs
Journal, Vol. 1 No. 2, pp. 31-48.
Hafeez, K., Zhang, Y.B. and Malak, N. (2002), “Core competence for sustainable competitive advantages: a structural methodology for identifying core competence”, IEEE Transaction on
Engineering Management, Vol. 49 No. 1, pp. 28-35.
Hair, J.F., Black, W.C., Babin, B.J. and Anderson, R.E. (2010), Multivariate Data Analysis, Seventh Edition, Prentice Hall, Upper Saddle River, New Jersey.
Hair, J.F., Hult, G.T.M., Ringle, C.M. and Sarstedt, M. (2013), A Primer on Partial Least Squares
Structural Equation Modeling (PLS-SEM), Thousand Oaks: Sage.
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
Hair, J.F., Sarstedt, M., Ringle, C.M. and Mena, J.A. (2012), “An assessment of the use of partial least squares structural equation modeling in marketing research”, Journal of the Academy of
Marketing Science, Vol. 40 No. 3, pp. 414-433.
Hale, T., and Moberg, C.R. (2005), “Improving supply chain disaster preparedness : a decision process for secure site selection”, International Journal of Physical Distribution & Logistics
Management, Vol. 35 No.3, pp. 195-207.
Hintsa, J., Wieser, P., Gutierrez, X. and Hameri, A.P. (2009), “Supply chain security management: an overview”, International Journal of Logistics Systems & Management, Vol. 5 No. 3-4, pp. 344-355.
Javidan, M. (1998), “Core competence: what does it mean in practice?”, Long Range Planning, Vol. 31 No. 1, pp. 60-71.
Kaleka, A. (2002), “Resources and capabilities driving competitive advantages in export market: guidelines for industrial exporters”, Industrial Marketing Management, Vol. 31 No. 3, pp. 273-283.
Knight, P. (2003), Supply Chain Security Guidelines, White Paper, IBM.
Kolluru, R. and Meredith, P.H. (2001), “Security and trust management in supply chains”, Information Management & Computer Security, Vol. 9 No. 5, pp. 233-236.
Lensing, R.P. (2003), Historical Events and Supply Chain Disruption: Chemical, Biological and
Cyber Events. Master Thesis, Engineering Systems Division, Massachusetts Institute of Technology.
Li, T. and Ye, Q. (2008), “New thoughts about supply chain security after 9-11 terrorist attack”, IEEE Xplore, pp. 2397-2400.
Martens, B.J., Crum, M.R. and Poist, R.F. (2011), “Examining antecedents to supply chain security effectiveness: An exploratory study”, Journal of Business Logistics, Vol. 32 No. 2, pp. 153-166.
Mayhew, C. (2001), “The detection and prevention of cargo theft”, Australian Institute of
Criminology, pp. 1-6.
McAfee, R.B., Glassman, M. and Honeycutt, E.D. (2002), “The effects of culture and human resource management policies on supply chain management strategy”, Journal of Business
Logistics, Vol. 23, pp. 1-18.
Michelberger, P. and Labodi, C. (2009), “Development of information security management system at the members of supply chain”, Annals of the University of Petrosani, Vol. 9 No. 4, pp. 69-78.
Morris, M.W., Williams, K.Y., Leung, K., Larrick, R., Mendoza, M.T., Bhatnagar, D., Li, J., Kondo, M., Luo, J.-L. and Hu, J.-C. (1998), “Conflict management style: accounting for cross-national differences, Journal of International Business Studies, Vol. 29 No. 4, pp. 729–748.
Peleg-Gillai, B., Bhat, G. and Sept, L. (2006), Innovators in supply chain security: better security
drives business value, The Manufacturing Innovation Series.
Petter, S., Straub, D. and Rai, A. (2007), “Specifying formative constructs in information systems research”, MIS Quarterly, Vol. 31 No. 1, pp. 623-56.
Podsakoff, P.M. and Organ, D.W. (1986), “Self-reports in organizational research: Problems and prospects”, Journal of Management, Vol. 12 No. 4, pp. 531–544.
Rice, J.B. and Spayd, P.W. (2005), Investing in supply chain security: collateral benefits, May 2005. IBM Center for The Business of Government.
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
Rice, J.B. and Caniato, F. (2003), “Building a secure and resilient supply network”, Supply Chain
Management Review, Vol. 7 No. 5, pp. 22-30.
Rinehart, L.M., Myers, M.B. and Eckert, J.A. (2004), “Supplier relationship: the impact on security”, Supply Chain Management Review, Vol.8 No. 6, pp. 52-59.
Ringle, C.M., Wende, S. and Will, A. (2005), “SmartPLS 2.0”, Available at: http://www.smartpls.de
Ruighaver, A.B., Maynard, S.B. and Chang, S. (2007), “Organisational security culture: Extending the end-user perspective”, Computers and Security, Vol. 26, pp. 56–62.
Rumelt, R. (1984), “Towards a strategic theory of the firm”, In Lamb, R. (ed), Competitive Strategic
Management, Englewood Cliffs, NJ: Prentice-Hall.
Sarathy, R. (2006), “Security and global supply chain”, Transportation Journal, Vol. 4 No. 4, pp. 28-51.
Securitex (2008), “Supply chain security management systems”, ISO28000, LRQA.
Shang, K.C. and Lu, C.S. (2009), “Effects of safety climate on perceptions of safety performance in container terminal operations”, Transport Reviews, Vol. 29 No. 1, pp. 1-19.
Sheffi, Y. (2001), “Supply chain management under the threat of international terrorism”, International Journal of Logistic Management, Vol. 12 No. 2, pp. 1-11.
Sheffi, Y. (2002), “Supply chains and terrorism”, in Kausel, E. (Ed.), The Towers Lost and Beyond:
A Collection of Essays on the WTC, Massachusetts Institute of Technology, Cambridge, MA. Available at: http://web.mit.edu/civenv/wtc/.
Sheffi, Y. (2005a), “Preparing for big one”, IEE Manufacturing Engineer, Vol. 84 No.5, pp. 12-15.
Sheffi, Y. (2005b), The Resilient Enterprise: Overcoming Vulnerability for Competitive Advantage, The MIT Press, Cambridge, MA.
Sheffi, Y. (2005c), “Preparing for the big one”, IEE Manufacturing Engineer, Vol. 84 No. 5, pp. 12-15.
Sheu, C., Lee, L. and Niehoff, B. (2006), “A voluntary logistics security program and international supply chain partnership”, Supply Chain Management: An International Journal, Vol. 11 No. 4, pp. 363-374.
Stanley, L. L. and Wisner, J.D. (2001), “Service Quality Along the Supply Chain: Implications for Purchasing”, Journal of Operations Management, Vol. 19 No. 3, pp. 287-306.
Stone, M. (1974), “Cross-validatory choice and assessment of statistical predictions”, Journal of the
Royal Statistical Society, Vol. 36 No. 2, pp. 111–133.
Tan, K.C., Kannan, K. and Handfield, R.B. (1998), “Supply chain management: supplier performance and supplier performance”, International Journal of Purchasing & Materials
Management, Vol. 34 No. 3, pp. 2-9.
Tay, L. and Ooi, T.L. (2001), “Facilities management: a Jack of all trades?”, Facilities, Vol. 19 No. 10, pp. 357-363.
Tichy, N. (1982), “Managing change strategically: the technical, political and cultural keys”, Organizational Dynamics, Vol. 11 No. 2, pp. 59-80.
Urciuoli, L. (2010), “Supply chain security – mitigation measures and a logistics multi-layered framework”, Journal of Transportation Security, Vol. 3 No. 1, pp. 1-28.
Van Oosterhout, M.P.A., Veenstra, A.W., Meijer, M.A.G., Popal, N. and Van den Berg, J. (2007), “Visibility platforms for enhancing supply chain security: a case study in the Port of
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
Rotterdam”, Proceeding of the International Symposium on Maritime Safety, Security and
Environmental Protection, Athens, September 2007, pp. 20-21.
Voss, M.D., Whipple, J.M. and Closs, D.J. (2009), The role of strategic security: Internal and external security measures with security performance implication, Transportation Journal,
Vol. 48 No. 2, pp.5-23.
Wernerfelt, B. (1984), “A resource-based view of the firm”, Strategic Management Journal, Vol. 5 No. 20, pp. 171-180.
Wetzels, M., Odekerken-Schroder, G. and van Oppen, C. (2009), “Using PLS path modeling for assessing hierarchical construct models: Guidelines and empirical illustration”, MIS Quarterly,
Vol. 33 No. 1, pp. 177-195.
Williams, Z. (2008), Supply Chain Security: An Institutional Approach to Strategic and Outcomes.
Ph.D Thesis, Mississippi State University, Mississippi.
Williams, Z., Lueg, J.E. and Lemay, S.A. (2008), “Supply chain security: an overview and research agenda”, The International Journal of Logistics Management, Vol. 19 No. 2, pp. 254-281.
Williams, Z., Lueg, J.E., Taylor, R. D. and Cook, R.L. (2009), “Why all the changes? An institutional theory approach to exploring the drivers of supply chain security (SCS)”, International Journal of Physical Distribution & Logistics Management, Vol. 39 No.7, pp. 595-618.
Williams, Z., Ponder, N. and Autry, C.W. (2009), “Supply chain security culture: measure development and validation”, The International Journal of Logistics Management, Vol. 20 No. 2, pp. 243–260.
Yang, C. C. and Wei H.H. (2013), “The effect of supply chain security management on security performance in container shipping operations’, Supply Chain International Journal, Vol. 18 No. 1, pp. 74–85.
Yang, C.C., Marlow, P.B. and Lu, C.S. (2009), “Assessing resources, logistics service capabilities, innovation capabilities and performance of container shipping service in Taiwan”, International Journal of Production Economics, Vol. 122 No. 1, pp. 4-20.
Yang, Y. (2011), “Risk management of Taiwan’s maritime supply chain security”, Safety Science,
Vol. 49 No. 3, pp. 382-393.
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
FIGURE 1: Proposed Theoretical Model
FIGURE 2: Path Analysis
FIGURE 3: Interaction Effect Of Facility Management And Security Culture On Security
Operational Performance
1
1.5
2
2.5
3
3.5
4
4.5
5
Low Facility Management High Facility Management
Security Operational Perform
ance
Low SecurityCulture
High SecurityCulture
Cargo Management
(CM)
Facility Management
(FM)
Human Resource
Management (HRM)
Information
Management (IM)
Supply Chain Security
Operational Performance
(SCSOP)
-Cargo Safety (CS)
-Supply Chain Visibility (SCV)
-Supply Chain Efficiency (SCE)
-Supply Chain Resilience (SCR)
Security Culture
(SC)
H1
H5
H2
H3
H4
Cargo Management
Facility Management
Human Resource
Management
Information
Management
R2=0.70
Supply Chain Security
Operational Performance
Cargo Safety
Supply Chain
Resilience
0.83***
0.80***
Supply Chain
Visibility
0.79***
0.84***
Supply Chain
Efficiency
0.29***
0.18*
0.27***
0.27***
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
TABLE 1: Measurement Model Evaluation Proposed Theoretical Model
Constructs Items Factor
Loadings
CR AVE
We have …….
Cargo
Management
(CR)
regular inspection during movement of cargo 0.849 0.934 0.704
adequate detection of shipping process anomalies 0.856
adequate supervision to avoid deviations in vehicles travel time 0.816
restricted access to documents related to cargo 0.781
appropriate identification for cargo 0.890
alternate plans for movement of cargo during emergency 0.839
Facility
Management
(FM)
fire protection system 0.889 0.962 0.720
sufficient lighting conditions 0.843
security guard to respond during emergency situation 0.861
clear identification of restricted areas 0.856
periodic inspection to assure integrity of security measures 0.863
restricted access to facility to only authorized personnel. 0.894
camera based systems that allow monitoring 0.865
monitor entry activities at facilities to avoid intrusion of unauthorized individuals 0.781
monitor exit activities at facilities to avoid intrusion of unauthorized individuals 0.815
physical obstacles to discourage theft in entering 0.811
Human
Resource
Management
(HRM)
rigorous screening process before hiring our employees 0.778 0.882 0.714
security training programmes for every employee 0.876
employee identification procedures 0.876
Information
Management
(IM)
processes to backup computer system data 0.773 0.866 0.684
recordkeeping of information for potential security audits 0.903
data exchange between supply chain partners 0.800
Security
Culture (SC)
senior manager views supply chain security as a competitive advantage 0.928 0.947 0.856
make sure that supply chain security is the first thing on the mind of all employees 0.922
make supply chain security the norm for all employees 0.925
dedicated efforts to create a supply chain security-focused workforce 0.874
make sure that all employees are vigilant towards supply chain security 0.895
Our company improves…….
Cargo Safety
(CS)
product safety by reducing cargo theft 0.909 0.970 0.890
product safety by reducing cargo loss 0.954
product safety by reducing cargo pilferage 0.961
product safety by reducing cargo tampering 0.949
Supply Chain
Visibility
(SCV)
inventory management by reduction of excess inventory 0.937 0.956 0.813
inventory management by increasing on time delivery 0.948
supply chain visibility by accessing to supply chain data 0.918
supply chain visibility with timeliness of shipping documents 0.835
product handling with automated handling of goods 0.863
Supply Chain
Efficiency
(SCE)
cargo delay during custom clearance 0.915 0.947 0.856
cargo inspection during custom clearance 0.934
cargo examination during custom clearance 0.925
Supply Chain
Resilience
(SCR)
cargo delivery time window 0.874 0.948 0.785
cargo problem identification time 0.895
cargo response time to problem 0.911
cargo problem resolution time 0.924
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
reduction of customer attrition 0.823
Note: CR= Composite Reliability; AVE= Average Variance Extracted
TABLE 2: Discriminant Validity Coefficients
CM CS FM HRM IM SCE SCR SC SCV
CM 0.839
CS 0.700 0.943
FM 0.635 0.631 0.849
HRM 0.547 0.539 0.596 0.845
IM 0.537 0.628 0.608 0.652 0.827
SCE 0.580 0.525 0.508 0.521 0.522 0.925
SCR 0.509 0.550 0.486 0.600 0.590 0.658 0.886
SC 0.604 0.625 0.701 0.650 0.555 0.624 0.549 0.925
SCV 0.473 0.577 0.618 0.650 0.552 0.529 0.524 0.632 0.901
TABLE 3: Path Coefficients And Hypothesis Testing
Hypothesis Relationship Path coefficient Effect Size Decision
H1 CM -> SCSOP 0.288*** 0.146 Supported
H2 FM -> SCSOP 0.175* 0.047 Supported
H3 HRM->SCSOP 0.269*** 0.113 Supported
H4 IM -> SCSOP 0.271*** 0.116 Supported
*p<0.05, **p<0.01, ***p<0.001 (one tailed)
TABLE 4: Moderating Effect Of Security Culture
Hypothesis Relationship Path Coefficient R2 Difference Decision
H5a CM -> SCSOP 0.225** 0.001 Not Supported
FM -> SCSOP 0.075
HRM -> SCSOP 0.180*
IM -> SCSOP 0.261**
SC -> SCSOP 0.280**
CM*SC ->SCSOP -0.036
H5b CM -> SCSOP 0.214** 0.016 Supported
FM -> SCSOP 0.158*
HRM -> SCSOP 0.1538
IM -> SCSOP 0.238**
SC -> SCSOP 0.272**
FM*SC->SCSOP 0.140*
H5c CM -> SCSOP 0.229** 0.001 Not Supported
FM -> SCSOP 0.074
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)
HRM -> SCSOP 0.179*
IM -> SCSOP 0.264**
SC -> SCSOP 0.280**
HRM*SC->SCSOP -0.037
H5d CM -> SCSOP 0.234** 0.006 Not Supported
FM -> SCSOP 0.069
HRM -> SCSOP 0.185*
IM -> SCSOP 0.250**
SC -> SCSOP 0.277**
IM*SC->SCSOP 0.077
*p<0.05, **p<0.01, ***p<0.001 (one tailed)
Dow
nloa
ded
by U
NIV
ER
SIT
Y O
F M
AL
AY
A A
t 19:
07 1
3 Ju
ne 2
015
(PT
)