Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
When security is deployedfor the logistic industry:ELISA, a case historyColumbia Business School - Columbia University - N...
Meet ELISA:Electronic Locking InteractiveSecurity Apparatus                    november 19 2012 | s.orsenigo@cleverthinkin...
General Market Concepts                  november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
QualityIn business, engineering and manufacturing,quality has a pragmatic interpretation as thenon-inferiority or superior...
“Being sure that a product arrives safely and undamaged to the final customer is obviously an aspect of its quality”       ...
Customer satisfactiona measure of how products and services supplied bya company meet or surpass customer expectation.In a...
“Making sure that a product arrives safely and undamaged to the final customer is obviously closely tied to that customer’s...
Cost optimization    Adjusting a/all process/es so as to optimize some    specified set of parameters without violating som...
“Making sure that all processes used to assure that the product arrives safely to the final customer are the best possible,...
Specific Keywords (or Concepts)                    november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Security:The degree of protection necessary to safeguardsomething (or someone) against danger, damage,loss, and crime. As ...
Risk:The Oxford English Dictionary defines risk as the:(Exposure to) the possibility of loss, injury, or otheradverse or un...
Analysis:The process of breaking a complex topic orsubstance into smaller parts, to gain a betterunderstanding of it.!Anal...
Management: All the activities put in place when conducting an activity. Proper management includes procedures for all pos...
Risk!Analysis!The cycle of security                    knowledge!&!awareness          !                                   ...
Both awareness and prior knowledge are to beconsidered a method as well as an objective and assuch they require an holisti...
Security deployed for logistics                     november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
the landscapeGlobalization and the consequent aperture of newmarkets requires that companies face new andbigger challenges...
This has required, in the last decade, a continuouspush for innovation in industrial strategies, in theorganization of the...
Logistic processes, thus, have grown and have beenimplemented with a series of technical andorganizational optimizations, ...
Nonetheless, to date, little attention (aside fromthe insurance point of view) has been placed on theaspects that relate t...
Such consequences are readily accessible in dailynews: property, information, equipment, supplies,personal belongings or i...
It is not easy, in fact, to monitor effectively the    entire path the goods travel to go from point A to!    point B, pri...
Logistics operators are obviously the ones primarily    affected by the “holes” in these processes, as they    are respons...
DHL has declared that, only in Europe, over 8 billionEuros in value of high added-value goods arestolen each year.!!!!Not ...
In such a complex and ever-changing environment    the primary efforts need be focused on developing    integrated product...
ELISA: the project                     november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
In this landscape, therefore, the need to rethink!    the various processes involved appeared evident.!!!We chose to appro...
•  Risk Analisys - to identify vulnerabilities, the   probabilities of happening and the type of   dangers and liabilities...
the risksThe analysis of the activities implemented inthe entire logistic path evidenced how the security risk is directly...
the assessmentThe evaluation of the elements of risk allowed forthe definition of a solution based upon aninnovative Integr...
The system is built on a IOT (Internet of Things)platform that can offer at any time, through ITS(Intelligent Transportati...
This allows Logistic Operators to monitor withoutinterruptions and in real-time the path followed bythe goods, the resourc...
Furthermore, these solutions address and resolvealso, amongst others, some important issuesrelated to the safety of the pr...
the solution: ELISA An “intelligent transportation unit” made up by:•  a container, fit for logistic transportation;•  an i...
ELISA: the Apparatus                       november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
the innovative containerELISA’s peculiarly die-cut cardboard container(subject also to a specific industrial patent) allows...
the ”smart” closureELISA’s particular container is associated to aspecially designed smart closing device.                ...
Structurally, the closing device is composed of twoelements of closure made of biodegradable plastic,one of which is immov...
The innovative structural characteristic of ELISA’s    closing system is the perfect integration of    different technolog...
technological add-onsThe closing system can be integrated with scalabletechnological devices which can modularly addfuncti...
connectivityELISA can exchange data and information witha remote Management & Control Platformthrough diverse standards of...
adaptabilityThe innovative functional characteristic of ELISA’sclosing system is its dynamic adaptability to anyrequiremen...
Summary of functionalities                   november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
Thanks to its innovative concepts and inventions,!    ELISA allows for:!-  monitoring the packing activity with respect to...
-  automate and optimize the different   management and control processes on the entire!   logistic path of the supply chai...
•  automatic detection of attempted theft or   concealment of the entire package;•  control of the conformity of transport...
ELISA is based on an industrial patent, conferredwith a high level of innovation and inventivenesswhich, do date, is exten...
Conclusions              november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
ELISA represents a good example of a new andinnovative approach to security in the logisticscontext.!!!!Through a rigorous...
Thank you for your attention(and patience with the language)Contacts:s.orsenigo@cleverthinkingllc.com@StefanoOrsenigo    ...
Upcoming SlideShare
Loading in …5
×

Presentation at Columbia University of ELISA security device

470 views

Published on

Presentation held at Columbia University on November 19, 2012 of ELISA.
ELISA is a "smart" security device and this presentation illustrates its deployment in the logistic and transportation

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Presentation at Columbia University of ELISA security device

  1. 1. When security is deployedfor the logistic industry:ELISA, a case historyColumbia Business School - Columbia University - New York, NYNovember 19 2012 november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  2. 2. Meet ELISA:Electronic Locking InteractiveSecurity Apparatus november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  3. 3. General Market Concepts november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  4. 4. QualityIn business, engineering and manufacturing,quality has a pragmatic interpretation as thenon-inferiority or superiority of something; it isalso defined as fitness for purpose.Managing quality is fundamental to any activity andit implies: having a clear understanding of allrelated aspects, measuring performance and takingaction to improve. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  5. 5. “Being sure that a product arrives safely and undamaged to the final customer is obviously an aspect of its quality” november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  6. 6. Customer satisfactiona measure of how products and services supplied bya company meet or surpass customer expectation.In a competitive marketplace - where businessescompete for customers - customer satisfaction isseen as a key differentiator and increasingly hasbecome a key element of business strategy.It is therefore essential for businesses to effectivelymanage customer satisfaction. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  7. 7. “Making sure that a product arrives safely and undamaged to the final customer is obviously closely tied to that customer’s satisfaction!” november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  8. 8. Cost optimization Adjusting a/all process/es so as to optimize some specified set of parameters without violating some! constraint is known as process optimization.!!!The most common benefits which derivefrom a successful optimization are: minimizing cost,maximizing throughput and/or efficiency. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  9. 9. “Making sure that all processes used to assure that the product arrives safely to the final customer are the best possible, obviously results into a more fluid and cost-effective system, one which gives the manufacturer better quality and higher customer satisfaction (and one that, therefore, can improve the company’s standing in the market)” november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  10. 10. Specific Keywords (or Concepts) november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  11. 11. Security:The degree of protection necessary to safeguardsomething (or someone) against danger, damage,loss, and crime. As a form of protection it includesall structures and processes that provide orimprove security as a condition.It also implies a condition in which one becomesAWARE of the possibility that, in its development, asystem can evolve into some unwanted states. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  12. 12. Risk:The Oxford English Dictionary defines risk as the:(Exposure to) the possibility of loss, injury, or otheradverse or unwelcome circumstance; a chance orsituation involving such a possibility.Risk is therefore the potential that a chosen ac-tion or activity (including the choice of inaction)will lead to a loss (an undesirable outcome).The notion implies that a choice having aninfluence on the outcome exists (or existed). november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  13. 13. Analysis:The process of breaking a complex topic orsubstance into smaller parts, to gain a betterunderstanding of it.!Analysis, in business, is a fundamental step toidentify needs so that solutions can be devisedand implemented. It involves the study of theactivity conducted and of all relative statistics,environment, procedures, workforce, risks andother pertinent aspects, with the objective ofproducing an assessment of the situation. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  14. 14. Management: All the activities put in place when conducting an activity. Proper management includes procedures for all possible stages of the activity: normal as well as critical. In the area of security, proper management implies devising:•  preventive measures (actions put in place to prevent the event of a possible risk)•  protective measures (actions put in place to protect people and goods in the case of an hazard) november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  15. 15. Risk!Analysis!The cycle of security knowledge!&!awareness ! Risk! Assessment! balance!&!selec6on! Risk! Management! ac6on!&!measure! november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  16. 16. Both awareness and prior knowledge are to beconsidered a method as well as an objective and assuch they require an holistic approach, consideringthe interdisciplinary and the global issues relatedto the subject of security. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  17. 17. Security deployed for logistics november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  18. 18. the landscapeGlobalization and the consequent aperture of newmarkets requires that companies face new andbigger challenges, to answer with quality andefficiency to client’s needs, especially in terms offlexibility, cost optimization and attention to theenvironment. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  19. 19. This has required, in the last decade, a continuouspush for innovation in industrial strategies, in theorganization of the operational processes and insystem management.!!!! Obviously, these development involve the field of logistics - as well as the supply chain infrastruc- tures and the systems used to manage them - which has also evolved to cater to the progressive demand for new solutions and new approaches. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  20. 20. Logistic processes, thus, have grown and have beenimplemented with a series of technical andorganizational optimizations, well supported by atechnology that is increasingly becoming moreefficient and cost-effective. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  21. 21. Nonetheless, to date, little attention (aside fromthe insurance point of view) has been placed on theaspects that relate to the industrial security oflogistic processes and to its components.!!!!Failing to acknowledge the consequences of suchoversight can heavily impact - in terms of quality aswell as of economical and financial implications - onthe business. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  22. 22. Such consequences are readily accessible in dailynews: property, information, equipment, supplies,personal belongings or intangible data, all can bestolen or damaged and the weakest link in thesupply chain is the process that takes a productfrom the manufacturer to the consumer is the roadthe product rides to reach the final user. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  23. 23. It is not easy, in fact, to monitor effectively the entire path the goods travel to go from point A to! point B, primarily for two reasons:!!!•  part of this process (like transportation or stock- age) is often assigned to third-party providers•  consequences of damaging acts by internal employees are considered more important than those perpetrated by other people, outside the company. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  24. 24. Logistics operators are obviously the ones primarily affected by the “holes” in these processes, as they are responsible for stocking and moving the goods! from one step to the next in the supply chain.!!!There are no certain statistics, although someresearches quantify the security issue in a valuethat goes from the 0,5% to the 1% of grossincome. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  25. 25. DHL has declared that, only in Europe, over 8 billionEuros in value of high added-value goods arestolen each year.!!!!Not to mention the damage derived by the loss inimage by the company. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  26. 26. In such a complex and ever-changing environment the primary efforts need be focused on developing integrated products and services at an accessible! cost, characterized by innovative high technologies.!!!The challenge?Delivering dynamic and sustainable answers to theever-changing needs of logistics operators in thesecure management of the supply chain. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  27. 27. ELISA: the project november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  28. 28. In this landscape, therefore, the need to rethink! the various processes involved appeared evident.!!!We chose to approach the issues with amethodological approach that implied thefollowing, consequential activities: november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  29. 29. •  Risk Analisys - to identify vulnerabilities, the probabilities of happening and the type of dangers and liabilities;•  Risk Assessment - with the aim of balancing risks and actions and of selecting the best and more opportune interventions;•  Risk Management - to apply the appropriate procedures and the best methodologies of management; november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  30. 30. the risksThe analysis of the activities implemented inthe entire logistic path evidenced how the security risk is directly tied to the increased incidence of certain factors:•  poorly controlled (or controllable) fluxes;•  increasingly small dimensions of products/goods;•  high added-value of products/goods;•  recyclability of products. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  31. 31. the assessmentThe evaluation of the elements of risk allowed forthe definition of a solution based upon aninnovative Integrated Security Model founded ona systemic base rather than on a technologicalpremise. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  32. 32. The system is built on a IOT (Internet of Things)platform that can offer at any time, through ITS(Intelligent Transportation Systems) and ALS(Advanced Logistic Services) solutions to assure theautomatic traceability and recoverability of goodsand products along the entire supply chain november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  33. 33. This allows Logistic Operators to monitor withoutinterruptions and in real-time the path followed bythe goods, the resources and the premises/facilities, regardless of their location.!!!! Obviously, this increases significantly the operative efficiency and the level of protection applied to the assets, allowing for more secure supply chains november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  34. 34. Furthermore, these solutions address and resolvealso, amongst others, some important issuesrelated to the safety of the products:•  by preventing or deterring counterfeiting and tampering; and•  by assuring the conformity of transportation and stocking with the most different legal requirements november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  35. 35. the solution: ELISA An “intelligent transportation unit” made up by:•  a container, fit for logistic transportation;•  an integrated “smart” closing device.!!!! The system is completed by the capability of an interactive connection with a Central Management Platform. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  36. 36. ELISA: the Apparatus november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  37. 37. the innovative containerELISA’s peculiarly die-cut cardboard container(subject also to a specific industrial patent) allowsfor a perfect homogeneity and geometriccontinuity which guarantees for excellent anti-burglary protection, while maintaining an elevatedergonomic quality and an equally highmanageability. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  38. 38. the ”smart” closureELISA’s particular container is associated to aspecially designed smart closing device. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  39. 39. Structurally, the closing device is composed of twoelements of closure made of biodegradable plastic,one of which is immovably connected withthe internal closing flap of the container. The otherelement is actively operative on the externalclosing flap.!!!!The internal locking element is predisposed toaccommodate different types (and levels) oftechnology, according to the operative requirements november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  40. 40. The innovative structural characteristic of ELISA’s closing system is the perfect integration of different technological devices with the internal! locking element.!!!This way, once closed, the container becomes“self-protecting”. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  41. 41. technological add-onsThe closing system can be integrated with scalabletechnological devices which can modularly addfunctionalities such as:•  simple identification and space-time localization through R.F.I.D. (Radio Frequency Identification),•  sophisticated functions of security, control and monitoring through ITS (Intelligent Transportation Systems), ALS (Advanced Logistic Services) and GPS (Global Positioning System) november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  42. 42. connectivityELISA can exchange data and information witha remote Management & Control Platformthrough diverse standards of communication,such as N.F (Near Field Comunication), GSM/ .C.GPRS or satellite. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  43. 43. adaptabilityThe innovative functional characteristic of ELISA’sclosing system is its dynamic adaptability to anyrequirement/need that may be opportune indifferent situations for each parcel. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  44. 44. Summary of functionalities november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  45. 45. Thanks to its innovative concepts and inventions,! ELISA allows for:!-  monitoring the packing activity with respect to the “picking list” of the order, memorizing the qualitative and quantitative data that refers to the nature and/or the quantity of the goods held by the container november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  46. 46. -  automate and optimize the different management and control processes on the entire! logistic path of the supply chain, including: •  traceability of the goods; •  correct loading sequence on the different vectors; •  stock management and warehouse restocking; •  automatic detection of attempted forceful opening or tampering of container; november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  47. 47. •  automatic detection of attempted theft or concealment of the entire package;•  control of the conformity of transportation/ stocking of goods to ensure the respect of the required legal parameters and procedures (through the monitoring of the environmental characteristics detectable inside and outside the container);•  permanent connection with a Management & Control Center, to exchange data and collect information in real time. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  48. 48. ELISA is based on an industrial patent, conferredwith a high level of innovation and inventivenesswhich, do date, is extended over Europe, USA andCanada. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  49. 49. Conclusions november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  50. 50. ELISA represents a good example of a new andinnovative approach to security in the logisticscontext.!!!!Through a rigorous scientific, technological andmanagerial approach, this system can guaranteeoperators in the field of logistics the utmosttechnical compatibility for every shipment and,from an economical point of view the best adapt-ability for most types of transportation needs. november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo
  51. 51. Thank you for your attention(and patience with the language)Contacts:s.orsenigo@cleverthinkingllc.com@StefanoOrsenigo november 19 2012 | s.orsenigo@cleverthinkingllc.com | @StefanoOrsenigo

×