Presentation at Columbia University of ELISA security device

Uploaded on

Presentation held at Columbia University on November 19, 2012 of ELISA. …

Presentation held at Columbia University on November 19, 2012 of ELISA.
ELISA is a "smart" security device and this presentation illustrates its deployment in the logistic and transportation

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
    Be the first to like this
No Downloads


Total Views
On Slideshare
From Embeds
Number of Embeds



Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

    No notes for slide


  • 1. When security is deployedfor the logistic industry:ELISA, a case historyColumbia Business School - Columbia University - New York, NYNovember 19 2012 november 19 2012 | | @StefanoOrsenigo
  • 2. Meet ELISA:Electronic Locking InteractiveSecurity Apparatus november 19 2012 | | @StefanoOrsenigo
  • 3. General Market Concepts november 19 2012 | | @StefanoOrsenigo
  • 4. QualityIn business, engineering and manufacturing,quality has a pragmatic interpretation as thenon-inferiority or superiority of something; it isalso defined as fitness for purpose.Managing quality is fundamental to any activity andit implies: having a clear understanding of allrelated aspects, measuring performance and takingaction to improve. november 19 2012 | | @StefanoOrsenigo
  • 5. “Being sure that a product arrives safely and undamaged to the final customer is obviously an aspect of its quality” november 19 2012 | | @StefanoOrsenigo
  • 6. Customer satisfactiona measure of how products and services supplied bya company meet or surpass customer expectation.In a competitive marketplace - where businessescompete for customers - customer satisfaction isseen as a key differentiator and increasingly hasbecome a key element of business strategy.It is therefore essential for businesses to effectivelymanage customer satisfaction. november 19 2012 | | @StefanoOrsenigo
  • 7. “Making sure that a product arrives safely and undamaged to the final customer is obviously closely tied to that customer’s satisfaction!” november 19 2012 | | @StefanoOrsenigo
  • 8. Cost optimization Adjusting a/all process/es so as to optimize some specified set of parameters without violating some! constraint is known as process optimization.!!!The most common benefits which derivefrom a successful optimization are: minimizing cost,maximizing throughput and/or efficiency. november 19 2012 | | @StefanoOrsenigo
  • 9. “Making sure that all processes used to assure that the product arrives safely to the final customer are the best possible, obviously results into a more fluid and cost-effective system, one which gives the manufacturer better quality and higher customer satisfaction (and one that, therefore, can improve the company’s standing in the market)” november 19 2012 | | @StefanoOrsenigo
  • 10. Specific Keywords (or Concepts) november 19 2012 | | @StefanoOrsenigo
  • 11. Security:The degree of protection necessary to safeguardsomething (or someone) against danger, damage,loss, and crime. As a form of protection it includesall structures and processes that provide orimprove security as a condition.It also implies a condition in which one becomesAWARE of the possibility that, in its development, asystem can evolve into some unwanted states. november 19 2012 | | @StefanoOrsenigo
  • 12. Risk:The Oxford English Dictionary defines risk as the:(Exposure to) the possibility of loss, injury, or otheradverse or unwelcome circumstance; a chance orsituation involving such a possibility.Risk is therefore the potential that a chosen ac-tion or activity (including the choice of inaction)will lead to a loss (an undesirable outcome).The notion implies that a choice having aninfluence on the outcome exists (or existed). november 19 2012 | | @StefanoOrsenigo
  • 13. Analysis:The process of breaking a complex topic orsubstance into smaller parts, to gain a betterunderstanding of it.!Analysis, in business, is a fundamental step toidentify needs so that solutions can be devisedand implemented. It involves the study of theactivity conducted and of all relative statistics,environment, procedures, workforce, risks andother pertinent aspects, with the objective ofproducing an assessment of the situation. november 19 2012 | | @StefanoOrsenigo
  • 14. Management: All the activities put in place when conducting an activity. Proper management includes procedures for all possible stages of the activity: normal as well as critical. In the area of security, proper management implies devising:•  preventive measures (actions put in place to prevent the event of a possible risk)•  protective measures (actions put in place to protect people and goods in the case of an hazard) november 19 2012 | | @StefanoOrsenigo
  • 15. Risk!Analysis!The cycle of security knowledge!&!awareness ! Risk! Assessment! balance!&!selec6on! Risk! Management! ac6on!&!measure! november 19 2012 | | @StefanoOrsenigo
  • 16. Both awareness and prior knowledge are to beconsidered a method as well as an objective and assuch they require an holistic approach, consideringthe interdisciplinary and the global issues relatedto the subject of security. november 19 2012 | | @StefanoOrsenigo
  • 17. Security deployed for logistics november 19 2012 | | @StefanoOrsenigo
  • 18. the landscapeGlobalization and the consequent aperture of newmarkets requires that companies face new andbigger challenges, to answer with quality andefficiency to client’s needs, especially in terms offlexibility, cost optimization and attention to theenvironment. november 19 2012 | | @StefanoOrsenigo
  • 19. This has required, in the last decade, a continuouspush for innovation in industrial strategies, in theorganization of the operational processes and insystem management.!!!! Obviously, these development involve the field of logistics - as well as the supply chain infrastruc- tures and the systems used to manage them - which has also evolved to cater to the progressive demand for new solutions and new approaches. november 19 2012 | | @StefanoOrsenigo
  • 20. Logistic processes, thus, have grown and have beenimplemented with a series of technical andorganizational optimizations, well supported by atechnology that is increasingly becoming moreefficient and cost-effective. november 19 2012 | | @StefanoOrsenigo
  • 21. Nonetheless, to date, little attention (aside fromthe insurance point of view) has been placed on theaspects that relate to the industrial security oflogistic processes and to its components.!!!!Failing to acknowledge the consequences of suchoversight can heavily impact - in terms of quality aswell as of economical and financial implications - onthe business. november 19 2012 | | @StefanoOrsenigo
  • 22. Such consequences are readily accessible in dailynews: property, information, equipment, supplies,personal belongings or intangible data, all can bestolen or damaged and the weakest link in thesupply chain is the process that takes a productfrom the manufacturer to the consumer is the roadthe product rides to reach the final user. november 19 2012 | | @StefanoOrsenigo
  • 23. It is not easy, in fact, to monitor effectively the entire path the goods travel to go from point A to! point B, primarily for two reasons:!!!•  part of this process (like transportation or stock- age) is often assigned to third-party providers•  consequences of damaging acts by internal employees are considered more important than those perpetrated by other people, outside the company. november 19 2012 | | @StefanoOrsenigo
  • 24. Logistics operators are obviously the ones primarily affected by the “holes” in these processes, as they are responsible for stocking and moving the goods! from one step to the next in the supply chain.!!!There are no certain statistics, although someresearches quantify the security issue in a valuethat goes from the 0,5% to the 1% of grossincome. november 19 2012 | | @StefanoOrsenigo
  • 25. DHL has declared that, only in Europe, over 8 billionEuros in value of high added-value goods arestolen each year.!!!!Not to mention the damage derived by the loss inimage by the company. november 19 2012 | | @StefanoOrsenigo
  • 26. In such a complex and ever-changing environment the primary efforts need be focused on developing integrated products and services at an accessible! cost, characterized by innovative high technologies.!!!The challenge?Delivering dynamic and sustainable answers to theever-changing needs of logistics operators in thesecure management of the supply chain. november 19 2012 | | @StefanoOrsenigo
  • 27. ELISA: the project november 19 2012 | | @StefanoOrsenigo
  • 28. In this landscape, therefore, the need to rethink! the various processes involved appeared evident.!!!We chose to approach the issues with amethodological approach that implied thefollowing, consequential activities: november 19 2012 | | @StefanoOrsenigo
  • 29. •  Risk Analisys - to identify vulnerabilities, the probabilities of happening and the type of dangers and liabilities;•  Risk Assessment - with the aim of balancing risks and actions and of selecting the best and more opportune interventions;•  Risk Management - to apply the appropriate procedures and the best methodologies of management; november 19 2012 | | @StefanoOrsenigo
  • 30. the risksThe analysis of the activities implemented inthe entire logistic path evidenced how the security risk is directly tied to the increased incidence of certain factors:•  poorly controlled (or controllable) fluxes;•  increasingly small dimensions of products/goods;•  high added-value of products/goods;•  recyclability of products. november 19 2012 | | @StefanoOrsenigo
  • 31. the assessmentThe evaluation of the elements of risk allowed forthe definition of a solution based upon aninnovative Integrated Security Model founded ona systemic base rather than on a technologicalpremise. november 19 2012 | | @StefanoOrsenigo
  • 32. The system is built on a IOT (Internet of Things)platform that can offer at any time, through ITS(Intelligent Transportation Systems) and ALS(Advanced Logistic Services) solutions to assure theautomatic traceability and recoverability of goodsand products along the entire supply chain november 19 2012 | | @StefanoOrsenigo
  • 33. This allows Logistic Operators to monitor withoutinterruptions and in real-time the path followed bythe goods, the resources and the premises/facilities, regardless of their location.!!!! Obviously, this increases significantly the operative efficiency and the level of protection applied to the assets, allowing for more secure supply chains november 19 2012 | | @StefanoOrsenigo
  • 34. Furthermore, these solutions address and resolvealso, amongst others, some important issuesrelated to the safety of the products:•  by preventing or deterring counterfeiting and tampering; and•  by assuring the conformity of transportation and stocking with the most different legal requirements november 19 2012 | | @StefanoOrsenigo
  • 35. the solution: ELISA An “intelligent transportation unit” made up by:•  a container, fit for logistic transportation;•  an integrated “smart” closing device.!!!! The system is completed by the capability of an interactive connection with a Central Management Platform. november 19 2012 | | @StefanoOrsenigo
  • 36. ELISA: the Apparatus november 19 2012 | | @StefanoOrsenigo
  • 37. the innovative containerELISA’s peculiarly die-cut cardboard container(subject also to a specific industrial patent) allowsfor a perfect homogeneity and geometriccontinuity which guarantees for excellent anti-burglary protection, while maintaining an elevatedergonomic quality and an equally highmanageability. november 19 2012 | | @StefanoOrsenigo
  • 38. the ”smart” closureELISA’s particular container is associated to aspecially designed smart closing device. november 19 2012 | | @StefanoOrsenigo
  • 39. Structurally, the closing device is composed of twoelements of closure made of biodegradable plastic,one of which is immovably connected withthe internal closing flap of the container. The otherelement is actively operative on the externalclosing flap.!!!!The internal locking element is predisposed toaccommodate different types (and levels) oftechnology, according to the operative requirements november 19 2012 | | @StefanoOrsenigo
  • 40. The innovative structural characteristic of ELISA’s closing system is the perfect integration of different technological devices with the internal! locking element.!!!This way, once closed, the container becomes“self-protecting”. november 19 2012 | | @StefanoOrsenigo
  • 41. technological add-onsThe closing system can be integrated with scalabletechnological devices which can modularly addfunctionalities such as:•  simple identification and space-time localization through R.F.I.D. (Radio Frequency Identification),•  sophisticated functions of security, control and monitoring through ITS (Intelligent Transportation Systems), ALS (Advanced Logistic Services) and GPS (Global Positioning System) november 19 2012 | | @StefanoOrsenigo
  • 42. connectivityELISA can exchange data and information witha remote Management & Control Platformthrough diverse standards of communication,such as N.F (Near Field Comunication), GSM/ .C.GPRS or satellite. november 19 2012 | | @StefanoOrsenigo
  • 43. adaptabilityThe innovative functional characteristic of ELISA’sclosing system is its dynamic adaptability to anyrequirement/need that may be opportune indifferent situations for each parcel. november 19 2012 | | @StefanoOrsenigo
  • 44. Summary of functionalities november 19 2012 | | @StefanoOrsenigo
  • 45. Thanks to its innovative concepts and inventions,! ELISA allows for:!-  monitoring the packing activity with respect to the “picking list” of the order, memorizing the qualitative and quantitative data that refers to the nature and/or the quantity of the goods held by the container november 19 2012 | | @StefanoOrsenigo
  • 46. -  automate and optimize the different management and control processes on the entire! logistic path of the supply chain, including: •  traceability of the goods; •  correct loading sequence on the different vectors; •  stock management and warehouse restocking; •  automatic detection of attempted forceful opening or tampering of container; november 19 2012 | | @StefanoOrsenigo
  • 47. •  automatic detection of attempted theft or concealment of the entire package;•  control of the conformity of transportation/ stocking of goods to ensure the respect of the required legal parameters and procedures (through the monitoring of the environmental characteristics detectable inside and outside the container);•  permanent connection with a Management & Control Center, to exchange data and collect information in real time. november 19 2012 | | @StefanoOrsenigo
  • 48. ELISA is based on an industrial patent, conferredwith a high level of innovation and inventivenesswhich, do date, is extended over Europe, USA andCanada. november 19 2012 | | @StefanoOrsenigo
  • 49. Conclusions november 19 2012 | | @StefanoOrsenigo
  • 50. ELISA represents a good example of a new andinnovative approach to security in the logisticscontext.!!!!Through a rigorous scientific, technological andmanagerial approach, this system can guaranteeoperators in the field of logistics the utmosttechnical compatibility for every shipment and,from an economical point of view the best adapt-ability for most types of transportation needs. november 19 2012 | | @StefanoOrsenigo
  • 51. Thank you for your attention(and patience with the language) november 19 2012 | | @StefanoOrsenigo