Bibliometric Insights into Balancing Efficiency and Security in Urban Supply Chains
Abstract
:1. Introduction
2. Literature Review
2.1. Themes and Theories
2.2. Historical Perspective
3. Methodology
3.1. Database Selection and Search Strategy
3.2. Inclusion and Exclusion Criteria
3.3. Bibliometric Analysis
3.4. Thematic Categorization
- Stop Word Removal: Filtering out common stop words and irrelevant terms to enhance analytical precision.
- Bigram Extraction: Identifying the top five bigrams by frequency for each article after applying lemmatization to convert words to their root forms.
- Bigram Aggregation: Pooling extracted bigrams across all articles within each document group and ranking them by frequency.
- Frequency Analysis: Highlighting the most prominent themes and terms within the literature corpus.
- Distribution Analysis: Examining the frequency and context of top bigrams to reveal thematic shifts over time.
- Visualization: Generating word clouds and distribution graphs to visually represent the predominant themes within each temporal cohort.
3.5. Algorithmic Workflow
- Step 1: Database Identification—identifying databases rich in relevant research articles.
- Step 2: Keyword Formulation—creating a list of search terms.
- Step 3: Temporal Filter—conducting searches within the specified year range.
- Step 4: Criteria-Based Filtering—screening search results based on inclusion and exclusion criteria.
- Step 5: Bibliometric Analysis—generating term co-occurrence networks.
- Step 6: Topical Relevance Filtering—ensuring selected literature contributes meaningfully to the objectives of the study.
- Step 1: Corpus Bifurcation—segmenting literature into pre- and post-COVID temporal cohorts for trend analysis.
- Step 2: Stop Word Removal—enhancing focus on content-rich words.
- Step 3: Bigram Extraction—identifying significant word pairs.
- Step 4: Bigram Aggregation—aggregating and ranking bigrams by frequency.
- Step 5: Frequency Analysis—highlighting prominent themes.
- Step 6: Distribution Analysis—identifying thematic shifts over time.
- Step 7: Visualization—creating word cloud visual representations of thematic data.
4. Results
- Red Cluster: the main themes are sustainability and energy with key terms including “energy security”, “sustainable development”, “carbon footprint”, and “environmental impact”.
- Green Cluster: the main themes are risk and security within the supply chain with key terms being “supply chain security”, “risk assessment”, “network security”, and “freight transportation”.
- Blue Cluster: the main themes are technology and data management with key terms being “blockchain”, “cybersecurity”, “internet of things”, and “smart contract”.
- Yellow Cluster: the main themes are food security and the impacts of the COVID-19 pandemic with key terms being “food quality”, “pandemic”, and “livelihood”.
- Purple Cluster: the main themes are economic and social effects with key terms being “energy utilization” and “health care”.
- Light Blue Cluster: as the smallest cluster, setting the minimum cluster size parameter merged it with the other clusters; specifically, “agriculture” merged with the yellow cluster and “digital storage” merged with the purple cluster.
Category | Theme | Sample Articles |
---|---|---|
Emerging Technologies | Blockchain and biometrics are pivotal in enhancing security and transparency in transportation | [1,4,5,26,27,28,29,39,40,41,46,47,48] |
Environmental Considerations | Integrating environmental sustainability with security in transportation is crucial for resilient supply chains. | [49,50] |
E-commerce Challenges | The surge in e-commerce demands innovative security strategies for efficient and safe package delivery. | [51,52] |
Standardization and Regulation Needs | Consistent standards and regulations are vital for ensuring security, especially in international supply chains. | [30,35,36,37,53,54] |
Practical Insights from Real-World Scenarios | Empirical studies offer valuable insights into the practical challenges and potentials of transportation security systems. | [10,31,32,33,34,55,56,57] |
5. Discussion
6. Conclusions
Author Contributions
Funding
Institutional Review Board Statement
Informed Consent Statement
Data Availability Statement
Conflicts of Interest
References
- Kulik, V.A.; Marchuk, V.Y.; Harmash, O.M.; Karpun, O.V.; Perederii, N.M. Security Management of Intermodal Transportation in Conditions of Sustainable Development of Global Supply Chains. Electron. Sci. Pract. Publ. Econ. Sci. 2022, 12, 45–56. [Google Scholar] [CrossRef]
- Zailani, S.H.; Subaramaniam, K.S.; Iranmanesh, M.; Shaharudin, M.R. The impact of supply chain security practices on security operational performance among logistics service providers in an emerging economy: Security culture as moderator. Int. J. Phys. Distrib. Logist. Manag. 2015, 45, 652–673. [Google Scholar] [CrossRef]
- Okafor, U.G.; Olalaye, M.A.; Asobara, H.C.; Umeodinka, E.F. Global impact of COVID-19 pandemic on public health supply chains. In Science-Based Approaches to Respond to COVID and Other Public Health Threats; Guerrero, E., Ed.; IntechOpen: London, UK, 2021; p. 280. [Google Scholar]
- Nanda, S.K.; Panda, S.K.; Dash, M. Medical supply chain integrated with blockchain and IoT to track the logistics of medical products. Multimed. Tools Appl. 2023, 82, 32917–32939. [Google Scholar] [CrossRef] [PubMed]
- Koliousis, I.G.; Tanveer, U.; Ishaq, S. A Conceptual Information Sharing Framework to Improve Supply Chain Security Collaboration. Int. J. Value Chain. Manag. 2020, 11, 346–365. [Google Scholar] [CrossRef]
- Stank, T.P.; Goldsby, T.J. A Framework for Transportation Decision Making in an Integrated Supply Chain. Supply Chain. Manag. Int. J. 2000, 5, 71–78. [Google Scholar] [CrossRef]
- Yang, Y.-C. Impact of the container security initiative on Taiwan’s shipping industry. Marit. Policy Manag. 2010, 37, 699–722. [Google Scholar] [CrossRef]
- Gould, J.E.; Macharis, C.; Haasis, H.-D. Emergence of security in supply chain management literature. J. Transp. Secur. 2010, 3, 287–302. [Google Scholar] [CrossRef]
- Chopra, S.; Meindl, P. Supply Chain Management: Strategy, Planning, and Operation; Pearson: London, UK, 2014; p. 516. [Google Scholar]
- Alshurideh, M.T.; Kurdi, B.A.; Alzoubi, A.A.; Al-Okaily, M. The Impact of Transportation Reliability on Supply Chain Efficiency at UAE Maritime Industry. Int. J. Bus. Anal. Secur. 2022, 2, 141–154. [Google Scholar] [CrossRef]
- Schivelbusch, W. The Railway Journey: The Industrialization of Time and Space in the Nineteenth Century; University of California Press: Oakland, CA, USA, 2014; p. 248. [Google Scholar]
- Casadevall, A. Antibody-based vaccine strategies against intracellular pathogens. Curr. Opin. Immunol. 2018, 53, 74–80. [Google Scholar] [CrossRef]
- Candra, E.; Azmi, A.; Gunawati, A. Position and Protection of Association Rights Security Unit in Human Rights Perspective According to the Basic State Law of the Republic of Indonesia Year 1945. JHR (J. Huk. Replik) 2021, 9, 157–171. [Google Scholar] [CrossRef]
- Flitton, G.; Breckon, T.P.; Megherbi, N. A 3D extension to cortex like mechanisms for 3D object class recognition. In Proceedings of the 2012 IEEE Conference on Computer Vision and Pattern Recognition, Providence, RI, USA, 16–21 June 2012. [Google Scholar]
- Blalock, G.; Kadiyali, V.; Simon, D.H. The impact of post-9/11 airport security measures on the demand for air travel. J. Law Econ. 2007, 50, 731–755. [Google Scholar] [CrossRef]
- Seidenstat, P. Terrorism, airport security, and the private sector. Rev. Policy Res. 2004, 21, 275–291. [Google Scholar] [CrossRef]
- Karşigil, E.; Savaş, A.T.E.Ş. Security Control Process Modeling during the COVID-19 Pandemic: Example of Esenboğa Airport. Akıllı Ulaşım Sist. Uygulamaları Derg. 2022, 5, 188–199. [Google Scholar] [CrossRef]
- Holz, R.; Sheffer, Y.; Saint-Andre, P. Recommendations for Secure Use of Transport Layer Security (TLS) and Datagram Transport Layer Security (DTLS); RFC 7525; RFC Editor: Marina del Rey, CA, USA, 2015. [Google Scholar]
- Nižetić, S.; Šolić, P.; Gonzalez-De, D.L.-D.-I.; Patrono, L. Internet of Things (IoT): Opportunities, issues and challenges towards a smart and sustainable future. J. Clean. Prod. 2020, 274, 122877. [Google Scholar] [CrossRef] [PubMed]
- Wang, F.; Casalino, L.P.; Khullar, D. Deep learning in medicine—Promise, progress, and challenges. JAMA Intern. Med. 2019, 179, 293–294. [Google Scholar] [CrossRef] [PubMed]
- Morosan, C. Theoretical and empirical considerations of guests’ perceptions of biometric systems in hotels: Extending the technology acceptance model. J. Hosp. Tour. Res. 2012, 36, 52–84. [Google Scholar] [CrossRef]
- Nyale, D.; Angolo, S.M. A Survey of Artificial Intelligence in Cyber Security. Int. J. Comput. Appl. Technol. Res. 2022, 11, 474–477. [Google Scholar] [CrossRef]
- Nikita, M.; Kashyap, L.; Singh, B.P.; Tyagi, D. AI Enabled Advance Surveillance System. Int. Res. J. Mod. Eng. Technol. Sci. 2023, 5, 6056–6061. [Google Scholar] [CrossRef]
- Yu, Y.; Lee, S. Remote driving control with real-time video streaming over wireless networks: Design and evaluation. IEEE Access 2022, 10, 64920–64932. [Google Scholar] [CrossRef]
- Lou, M.; Dong, X.; Cao, Z.; Shen, J. SESCF: A Secure and Efficient Supply Chain Framework via Blockchain-Based Smart Contracts. Secur. Commun. Netw. 2021, 2021, 8884478. [Google Scholar] [CrossRef]
- Shahzad, A.; Zhang, K.; Gherbi, A. Intuitive development to examine collaborative IoT supply chain system underlying privacy and security levels and perspective powering through proactive blockchain. Sensors 2020, 20, 3760. [Google Scholar] [CrossRef] [PubMed]
- Zhang, X.; Sun, P.; Xu, J.; Wang, X.; Yu, J.; Zhao, Z.; Dong, Y. Blockchain-based safety management system for the grain supply chain. IEEE Access 2020, 8, 36398–36410. [Google Scholar] [CrossRef]
- Nair, V.V. Drones as Futuristic Crime Prevention Strategy: Situational Review During COVID-19 Lockdown. J. Soc. Sci. 2020, 64, 22–29. [Google Scholar] [CrossRef]
- Kunovjanek, M.; Wankmüller, C. Containing the COVID-19 pandemic with drones-Feasibility of a drone enabled back-up transport system. Transp. Policy 2021, 106, 141–152. [Google Scholar] [CrossRef] [PubMed]
- Asamoah, D.; Nuertey, D.; Agyei-Owusu, B.; Acquah, I.N. Antecedents And Outcomes of Supply Chain Security Practices: The Role of Organizational Security Culture and Supply Chain Disruption Occurrence. Int. J. Qual. Reliab. Manag. 2022, 39, 1059–1082. [Google Scholar] [CrossRef]
- Solfa, F.D.G. Impacts of Cyber Security and Supply Chain Risk on Digital Operations: Evidence from the Pharmaceutical Industry. Int. J. Technol. Innov. Manag. 2022, 2, 18–32. [Google Scholar] [CrossRef]
- Alshurideh, M.T.; Alquqa, E.K.; Alzoubi, H.M.; Kurdi, B.A.; Hamadneh, S. The effect of information security on e-supply chain in the UAE logistics and distribution industry. Uncertain Supply Chain. Manag. 2023, 11, 145–152. [Google Scholar] [CrossRef]
- Kang, P.; Song, G.; Xu, M.; Miller, T.R.; Wang, H.; Zhang, H.; Liu, G.; Zhou, Y.; Ren, J.; Zhong, R.; et al. Low-carbon pathways for the booming express delivery sector in China. Nat. Commun. 2021, 12, 450. [Google Scholar] [CrossRef] [PubMed]
- Szyliowicz, J.S. International transportation security. Rev. Policy Res. 2004, 21, 351–368. [Google Scholar] [CrossRef]
- Kusrini, E.; Hanim, K. Analysis of compliance and supply chain security risks based on ISO 28001 in a logistic service provider in Indonesia. Int. J. Saf. Secur. Eng. 2021, 11, 135–142. [Google Scholar] [CrossRef]
- Jażdżewska-Gutta, M.; Borkowski, P. As strong as the weakest link. Transport and supply chain security. Transp. Rev. 2022, 42, 762–783. [Google Scholar] [CrossRef]
- Pourakbar, M.; Zuidwijk, R.A. The role of customs in securing containerized global supply chains. Eur. J. Oper. Res. 2018, 271, 331–340. [Google Scholar] [CrossRef]
- Zhao, J.; Liu, X.; Yan, Q.; Li, B.; Shao, M.; Peng, H.; Sun, L. Automatically predicting cyber attack preference with attributed heterogeneous attention networks and transductive learning. Comput. Secur. 2021, 102, 102152. [Google Scholar] [CrossRef]
- Pozniak, O.; Yurchenko, K. Formation of the optimal business model of a logistics company. Intellectualiz. Logist. Supply Chain. Manag. 2021, 10, 19–36. [Google Scholar] [CrossRef] [PubMed]
- De Liso, N.; Zamparini, L. Innovation, transport security and supply chains: A review. Transp. Rev. 2022, 42, 725–738. [Google Scholar] [CrossRef]
- Zamparini, L. A review of models for transport security and of their relevance for supply chains. Transp. Rev. 2022, 42, 784–800. [Google Scholar] [CrossRef]
- Edwards, F.L.; Goodrich, D.C. Introduction to Transportation Security, 2nd ed.; CRC Press: Boca Raton, FL, USA, 2024. [Google Scholar]
- Page, M.J.; McKenzie, J.E.; Bossuyt, P.M.; Boutron, I.; Hoffmann, T.C.; Mulrow, C.D.; Shamseer, L.; Tetzlaff, J.M.; Akl, E.A.; Brennan, S.E.; et al. The PRISMA 2020 statement: An updated guideline for reporting systematic reviews. BMJ 2021, 372, n71. [Google Scholar] [CrossRef] [PubMed]
- Eck, N.J.V.; Waltman, L. VOSviewer. Leiden University, 1 July 2024. Available online: https://www.vosviewer.com/ (accessed on 30 June 2024).
- Aggarwal, C.C. Data Mining; Springer International Publishing: New York, NY, USA, 2015; p. 734. [Google Scholar]
- Lei, A.; Cruickshank, H.; Cao, Y.; Asuquo, P.; Ogah, C.P.A.; Sun, Z. Blockchain-based dynamic key management for heterogeneous intelligent transportation systems. IEEE Internet Things J. 2017, 4, 1832–1843. [Google Scholar] [CrossRef]
- Ajao, L.A.; Agajo, J.; Adedokun, E.A.; Karngong, L. Crypto hash algorithm-based blockchain technology for managing decentralized ledger database in oil and gas industry. J (Multidiscip. Sci. J.) 2019, 2, 300–325. [Google Scholar] [CrossRef]
- Reeb, T. (Ed.) Empowering the New Mobility Workforce: Educating, Training, and Inspiring Future Transportation Professionals; Elsevier: Amsterdam, The Netherlands, 2019. [Google Scholar]
- Zavitsas, K.; Zis, T.; Bell, M.G. The impact of flexible environmental policy on maritime supply chain resilience. Transp. Policy 2018, 72, 116–128. [Google Scholar] [CrossRef]
- Pintea, C.-M.; Calinescu, A.; Sitar, C.P.; Pop, P.C. Towards secure & green two-stage supply chain networks. Log. J. IGPL 2019, 27, 137–148. [Google Scholar]
- Seaton, H.E. The new e-commerce/home delivery retail distribution paradigm. J. Transp. Manag. 2018, 29, 7–25. [Google Scholar] [CrossRef]
- Arnold, F.; Cardenas, I.; Sörensen, K.; Dewulf, W. Simulation of B2C e-commerce distribution in Antwerp using cargo bikes and delivery points. Eur. Transp. Res. Rev. 2018, 10, 2. [Google Scholar] [CrossRef]
- Urciuoli, L. The risk of standards proliferation–An analysis of differences between private and public transport standards. Transp. Res. Part A Policy Pract. 2018, 116, 591–602. [Google Scholar] [CrossRef]
- Tong, X.; Lo, C.K.; Lai, K.-H.; Cheng, T.C.E. Supply chain security management: A citation network analysis. Int. J. Shipp. Transp. Logist. 2019, 11, 508–532. [Google Scholar] [CrossRef]
- Sidebottom, A.; Thornton, A.; Tompson, L.; Belur, J.; Tilley, N.; Bowers, K. A systematic review of tagging as a method to reduce theft in retail environments. Crime Sci. 2017, 6, 7. [Google Scholar] [CrossRef] [PubMed]
- Khaslavskaya, A.; Roso, V. Outcome-driven supply chain perspective on dry ports. Sustainability 2019, 11, 1492. [Google Scholar] [CrossRef]
- Fokum, D.T.; Frost, V.S.; Kuehnhausen, M.; DePardo, D.; Oguna, A.N.; Searl, L.S.; Komp, E.; Zeets, M.; Deavours, D.D.; Evans, J.B.; et al. An open-system transportation security sensor network: Field-trial experiences. IEEE Trans. Veh. Technol. 2010, 59, 3942–3955. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Jinor, E.; Bridgelall, R. Bibliometric Insights into Balancing Efficiency and Security in Urban Supply Chains. Urban Sci. 2024, 8, 100. https://doi.org/10.3390/urbansci8030100
Jinor E, Bridgelall R. Bibliometric Insights into Balancing Efficiency and Security in Urban Supply Chains. Urban Science. 2024; 8(3):100. https://doi.org/10.3390/urbansci8030100
Chicago/Turabian StyleJinor, Emmanuel, and Raj Bridgelall. 2024. "Bibliometric Insights into Balancing Efficiency and Security in Urban Supply Chains" Urban Science 8, no. 3: 100. https://doi.org/10.3390/urbansci8030100
APA StyleJinor, E., & Bridgelall, R. (2024). Bibliometric Insights into Balancing Efficiency and Security in Urban Supply Chains. Urban Science, 8(3), 100. https://doi.org/10.3390/urbansci8030100