Concepts and methods for security management along the entire commodity chain, with the aim of identifying and assessing failure risks and damage potential, detecting security gaps at an early stage, recognizing technical and organizational deficits, and identifying potential for the reduction of dependencies from delivery failures.
End users include public authorities, security and emergency services (police, customs, disaster relief, and others) and infrastructure operators (e.g. transport and logistics providers, commercial enterprises, and operators of storage facilities and transportation hubs for goods and commodities).
EDIAUDIT LEARNING EXERCISE : HOW TO ELABORATE INNOVATIVE DESIGN COLLABORATIVE SUPPLY CHAIN SECURING PROCESS USING INTELLIGENT DOCUMENT CONCEPT?
Type of Task:
Standard Process Description Format
UNIX environment, JAVA programming languge, XML standard
Design & Monitoring automated process
Some technical documents shall be provided to those who apply for the above learning exercise.
Text of Learning Exercise:
HOW TO ELABORATE INNOVATIVE DESIGN COLLABORATIVE SUPPLY CHAIN SECURING PROCESS USING INTELLIGENT DOCUMENT CONCEPT?