Skip to main content

    Wout Hofman

    ABSTRACT The risk management over a supply chain has to be founded on the management controls in each of the partner companies in the chain. Inevitably, the business relationship and operations dependence bind the control efforts of... more
    ABSTRACT The risk management over a supply chain has to be founded on the management controls in each of the partner companies in the chain. Inevitably, the business relationship and operations dependence bind the control efforts of partner companies together. This proposes challenges for supply chain risk management and at the same time for the BI application. In this paper we analyse the management control situations where business intelligence technology can be applied and describe the concepts of systematic risk analysis to improve the management controls, based on causal analysis of business exceptions. The analysis process is driven by diagnostic drill-down operations following the equations of the information structure in which the data are organised. Using business intelligence, the analysis method can generate explanations supported by the data. A “risk template” is provided to assist analysts to fully comprehend the risk scenario in the practical business setting, so as to evaluate and re-design the existing controls, and to apply BI for management improvement.
    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and... more
    The Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to be considered at design time of the new data pipeline system. This challenge is taken up in this paper. First, based on an analysis of the proposed data pipeline concept, access control requirements are being defined. Second, a new multi-level access control model is being designed. The resulting model organizes access control at two levels, namely, at country and at service level, herewith enabling secure information exchange between global stakeholders.
    he Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and... more
    he Seamless Integrated Data Pipeline system was proposed to the European Union in order to overcome the information quality shortcomings of the current international supply chain information exchange systems. Next to identification and authorization of stakeholders, secure access control needs to be considered at design time of the new data pipeline system. This challenge is taken up in this paper. First, based on an analysis of the proposed data pipeline concept, access control requirements are being defined. Second, a new multi-level access control model is being designed. The resulting model organizes access control at two levels, namely, at country and at service level, herewith enabling secure information exchange between global stakeholders.
    Ten years ago ExSpect became available on the market. Since then a lot of modeling and simulation projects in logistics, workflow and electronic commerce have been performed using ExSpect. In the past ten years the heart of ExSpect, the... more
    Ten years ago ExSpect became available on the market. Since then a lot of modeling and simulation projects in logistics, workflow and electronic commerce have been performed using ExSpect. In the past ten years the heart of ExSpect, the simulation engine, has never been changed: it still executes models of hierarchical, timed, colored Petri nets with priorities. Over the years new features have been introduced based on user requests. Three extensions dominate the new functionality of ExSpect. The first is 'ease of use'in simulating ...
    In the current society, logistics is faced with at least two big challenges. The first challenge considers safety and security measurements dealing with terrorism, smuggling, and related security accidents with a high societal impact. The... more
    In the current society, logistics is faced with at least two big challenges. The first challenge considers safety and security measurements dealing with terrorism, smuggling, and related security accidents with a high societal impact. The second challenge is to meet sustainability requirements implying optimal use of resources and physical infrastructure. A condition sine qua non for dealing with these challenges is the realization of a flexible platform for sustainable and secure data exchange between collaborating global supply chain actors. This paper presents such a platform. It allows shippers, authorities, logistic service providers, and carriers to be fully interoperable across closed communities, to perform paperless logistics, and to adhere to societal demands of security, safety, and sustainability. Its functionality is derived from similar approaches as have been applied in modern social media. The paper elaborates on the functionality of the platform and its implications for research. It builds upon the research and innovation work as currently done within the EU FP7 Cassandra and iCargo projects.
    Research Interests:
    In order to make the international supply chain system highly efficient in worldwide transportation of goods, its business processes should be supported by high quality information systems that, “24x7”, provide the right data, at the... more
    In order to make the international supply chain system highly efficient in worldwide transportation of goods, its business processes should be supported by high quality information systems that, “24x7”, provide the right data, at the right time, at the right place, to the right person. To do so, the idea of a (virtual) “Seamless Integrated Data Pipeline” has been proposed, a new concept of an effective information exchange system. A key requirement of the Data Pipeline is that the information to be exchanged must be safe and reliable. Starting form the idea that existing systems should be used, this paper proposes three basic protocols that enable the secure exchange of data with respect to three identified security requirements, namely, that of secure identification of supply chain partners, that of harmonization of security levels, and that of harmonization of trust levels.
    Research Interests:
    Page 1. 1 Introduction 285 Chapter 16: An Implementation Framework for e-Solutions for Trade Facilitation Eveline van Stijn*, Thayanan Phuaphanthong**, Somnuk Keretho**, Markus Pikart***, Wout Hofman****, Yao-Hua Tan***** ... Rukanova et... more
    Page 1. 1 Introduction 285 Chapter 16: An Implementation Framework for e-Solutions for Trade Facilitation Eveline van Stijn*, Thayanan Phuaphanthong**, Somnuk Keretho**, Markus Pikart***, Wout Hofman****, Yao-Hua Tan***** ... Rukanova et al., 2009; Van Stijn et al., 2009). ...
    This chapter highlights the core research methodology, e3-control, that is applied throughout the ITAIDE project for the purpose of control procedure redesign. We present the key concept of the e3-control methodology and its technical... more
    This chapter highlights the core research methodology, e3-control, that is applied throughout the ITAIDE project for the purpose of control procedure redesign. We present the key concept of the e3-control methodology and its technical guidelines. Based on the output of this chapter, domain experts may carry out step-by-step analysis and redesign of control procedures, taking both value and process perspectives
    ... al., 2008; Kartseva et al., 2006; Liu et al., 2007; Liu et al., 2006; Mangan et al., 2009; Razmerita & Bjørn-Andersen, 2007a, 2007b; Rukanova et al., 2009a; Rukanova et al., 2007; Rukanova et al., 2008, 2009b; Tan... more
    ... al., 2008; Kartseva et al., 2006; Liu et al., 2007; Liu et al., 2006; Mangan et al., 2009; Razmerita & Bjørn-Andersen, 2007a, 2007b; Rukanova et al., 2009a; Rukanova et al., 2007; Rukanova et al., 2008, 2009b; Tan et al., 2006a, 2006b; van Stijn et al., 2009; Whitley & Rukanova ...