Atnaujinkite slapukų nuostatas

El. knyga: Intermodal Maritime Security: Supply Chain Risk Mitigation

Edited by (Distinguished Professor of Supply Chain Management, Pennsylvania State University, USA), Edited by (Professor of Professional Practice, University of Massachusetts Lowell, USA)
  • Formatas: EPUB+DRM
  • Išleidimo metai: 27-Nov-2020
  • Leidėjas: Elsevier Science Publishing Co Inc
  • Kalba: eng
  • ISBN-13: 9780128204290
  • Formatas: EPUB+DRM
  • Išleidimo metai: 27-Nov-2020
  • Leidėjas: Elsevier Science Publishing Co Inc
  • Kalba: eng
  • ISBN-13: 9780128204290

DRM apribojimai

  • Kopijuoti:

    neleidžiama

  • Spausdinti:

    neleidžiama

  • El. knygos naudojimas:

    Skaitmeninių teisių valdymas (DRM)
    Leidykla pateikė šią knygą šifruota forma, o tai reiškia, kad norint ją atrakinti ir perskaityti reikia įdiegti nemokamą programinę įrangą. Norint skaityti šią el. knygą, turite susikurti Adobe ID . Daugiau informacijos  čia. El. knygą galima atsisiųsti į 6 įrenginius (vienas vartotojas su tuo pačiu Adobe ID).

    Reikalinga programinė įranga
    Norint skaityti šią el. knygą mobiliajame įrenginyje (telefone ar planšetiniame kompiuteryje), turite įdiegti šią nemokamą programėlę: PocketBook Reader (iOS / Android)

    Norint skaityti šią el. knygą asmeniniame arba „Mac“ kompiuteryje, Jums reikalinga  Adobe Digital Editions “ (tai nemokama programa, specialiai sukurta el. knygoms. Tai nėra tas pats, kas „Adobe Reader“, kurią tikriausiai jau turite savo kompiuteryje.)

    Negalite skaityti šios el. knygos naudodami „Amazon Kindle“.

Intermodal Maritime Security: Supply Chain Risk Mitigation offers every stakeholder involved in international transactions the tools needed to assess the essential risks, threats and vulnerabilities within the global supply chain. The book examines the role intermodal maritime transportation plays in global security, surveying its critical policies, procedures, operations, infrastructure and systems. Linking new technological standards with intermodal operations, this book provides the foundational knowledge readers need, including transportation and maritime trade students, researchers, practitioners and regulatory agencies.
  • Blends academic knowledge with real-world experiences
  • Drawn from subject matter experts in academia, importers and exporters, transportation firms, and trade intermediaries
  • Breadth of multidisciplinary coverage from maritime supply chains, port and maritime operations, as well as cyber and physical security
Contributors xiii
Combined Cameo Bios xv
Foreword xxi
Preface xxiii
Acknowledgments xxv
PART I Introduction
1(22)
Chapter 1 9.11, Maritime Transportation Security Act (MTSA), and how we got to where we are?
3(20)
Richard R. Young
Gary A. Gordon
Maritime trade and the Supply Chain Operations Reference model
5(1)
Components of international maritime trade
6(6)
Supporting implementation plans of the NSMS
12(5)
Maritime Domain Awareness
12(1)
Global Maritime Intelligence Integration Plan
13(1)
Maritime Operational Threat Response Plan
14(1)
International outreach and coordination strategy
14(1)
Maritime Infrastructure Recovery Plan
15(1)
Maritime Transportation System Security Plan
15(1)
Maritime Commerce Security Plan
16(1)
Domestic Outreach Plan
17(1)
Summary
17(1)
Appendix A Title I--Maritime Transportation Security, Section 101: findings
18(2)
References
20(3)
PART II Overview of intermodal maritime operations
23(48)
Chapter 2 Intermodalism history, advantages, and disadvantages
25(14)
Richard R. Young
Intermodalism: maritime and rail
25(1)
Intermodalism: maritime and truck
26(1)
Advantages to containerization
27(3)
Fleet size
27(1)
Cargo stowage
28(1)
Reduced inventory carrying costs
28(1)
Reduced cargo loss and damage
29(1)
Disadvantages of containerization
30(3)
Port infrastructure
31(2)
Container security
33(1)
Needs of the small shipper and consignee
34(1)
Shifts over time
35(1)
Other developments
36(1)
Summary
37(1)
References
37(1)
Further reading
37(2)
Chapter 3 Water and landside components
39(16)
Richard R. Young
Physical service providers
40(1)
Information service providers
41(1)
Suppliers of goods
42(1)
Infrastructure-related
42(1)
Historical perspective
43(5)
Port operations and opportunities for security breach
48(1)
Information-related
49(1)
Evolution of port infrastructure
49(1)
Significance to supply chains
50(3)
References
53(1)
Further reading
53(2)
Chapter 4 Other transportation modes
55(16)
Gary A. Gordon
Domestic ports
59(1)
International ports
60(2)
Risk to rail and trucking to ports
62(4)
Risk
62(1)
Threats
62(2)
Vulnerabilities
64(1)
Consequences
65(1)
Addressing the Risk
66(1)
References
67(4)
PART III The nature of intermodal maritime security risk
Chapter 5 Nature of the intermodal maritime security risk?
71(14)
A dramatic shift in global trade
75(6)
Rough seas on the North Atlantic
81(1)
Port-to-port (pier-to-pier)
82(1)
Door-to-port/port-to-door
82(1)
Door-to-door (house-to-house)
83(1)
References
83(2)
Chapter 6 Components of intermodal maritime security risk
85(16)
The container: it is just a big box, right?
85(3)
Seals: keeping the goods inside and intruders out
88(9)
Outbound shipments
92(1)
Inbound shipments
92(1)
Thinking about your supply chain: important considerations
92(5)
Some final words of advice to shippers
97(1)
Appendix A Directory for standards associations for seals
98(1)
Appendix B Glossary of terms regarding seals
98(1)
References
99(2)
Chapter 7 Threats from terrorists and other violent nonstate actors
101(28)
James J.F. Forest
Maritime terrorism: a brief overview
102(12)
Terrorist threats to intermodal maritime security
106(8)
Intermodal maritime security threats from nonideologically oriented criminals
114(7)
The primacy of piracy
116(5)
Attacking intermodal maritime targets: motivations and challenges
121(1)
Future projections of threat
122(2)
References
124(5)
Chapter 8 Physical and technological considerations
129(22)
Gary A. Gordon
Bennett C. Abrams
Physical security measures
129(14)
Access control
131(4)
Lighting
135(1)
Intrusion detection
136(4)
Infrastructure protection and hardening
140(3)
Technological security measures
143(4)
Summary
147(1)
References
148(3)
Chapter 9 Vulnerabilities, gaps, and the future of physical and technological security measures
151(18)
Gary A. Gordon
Bennett C. Abrams
Vulnerabilities and gaps in security measures
151(5)
Future of physical and technological security measures
156(10)
Access control
157(1)
Lighting
158(2)
Intrusion detection
160(2)
Infrastructure protection and hardening
162(2)
Technological security measures
164(1)
Summary
165(1)
Appendix A University, government agency, and industry research organizations
166(1)
References
167(2)
Chapter 10 Information security and cyber threats and vulnerabilities
169(26)
Andrew B. Morrow
Information security introduction
169(1)
Basic principles
170(8)
Key concepts
170(8)
Auditing concepts
178(1)
Separation of duties
178(1)
Job rotation
178(1)
Risk management
178(1)
Transportation-related cybersecurity
179(5)
Maritime Transportation Security Act of 2002
180(1)
U.S. Coast GuaruTTSA Transportation Worker Identification Credential
181(1)
U.S. Customs and Border Protections programs
181(1)
Cargo Systems Messaging Service
181(1)
Automated Commercial Environment
181(1)
Customs-Trade Partnership Against Terrorism
182(1)
Container security initiative
183(1)
Intra-shipment and post-shipment controls
184(3)
Supervisory control and data acquisition processes
184(1)
U.S. Coast Guard's Automatic Identification System
185(1)
CBP vehicle and cargo inspection system
185(1)
Radiation portals at ports
186(1)
Port security and surveillance systems
187(1)
Vulnerabilities
187(4)
Summary
191(1)
References
192(3)
Part IV Security measures and public policy
195(40)
Chapter 11 Multilateral trading partner policies
197(18)
Matthew R. Peterson
Richard R. Young
Why the focus on intermodal transportation?
197(1)
Taxonomy of intermodal threats
198(1)
Immediate post-world war II
198(3)
Developed nations expand global oversight
201(5)
Australia group
201(1)
Wassenaar arrangement
202(2)
The post-9/11 era
204(2)
National Maritime Intelligence-Integration Office
206(4)
Customs-trade partnership against terrorism
206(1)
Container security initiative
207(1)
Authorized economic operator credential
207(1)
The proliferation security initiative
208(1)
Multilayered defenses still leave gaps
209(1)
Appendix A Wassenaar checklist for international sellers
210(2)
Your product
210(1)
End user and end use
211(1)
Shipment
211(1)
Finance and contract conditions
212(1)
Appendix B Wassenaar checklist for transit and transshipment
212(1)
References
213(2)
Chapter 12 Intermodal transport security--the Israeli perspective
215(20)
Aleksander Gerson
Tomer May
Part I Overview of maritime security
215(1)
Introduction
215(2)
The vital role of ports and shipping of Israel
216(1)
Israel's ports
217(7)
Threats to maritime transport to and from Israel
219(2)
Maritime transport--a vector for smuggling of military hardware
221(1)
Smuggling of military hardware
222(1)
Dual-purpose materials
223(1)
Smuggling illicit goods and drugs to sponsor terror activities
223(1)
Containers as a direct vector for terrorist attack
223(1)
Thwarting threats to freedom of navigation--Israeli national doctrine
224(1)
How are these goals achievable?
224(1)
Securing Israeli commercial ports
225(1)
Conclusion
225(1)
Part II Implementation of security
225(1)
Introduction
225(1)
Israel's security model
226(1)
The maritime arena
227(1)
The Israeli Navy
228(1)
Freedom of navigation--the Israeli perspective
228(1)
Intermodal transport
229(3)
Summary
232(1)
Acknowledgments
233(1)
References
233(2)
PART V Risk mitigation approach
235(80)
Chapter 13 Loading at a foreign port
237(22)
Richard R. Young
Gary A. Gordon
Bennett C. Abrams
Illustrative case: Ready-Tech, Inc
237(3)
Three shipments and their particulars
238(1)
Specific logistics arrangements
239(1)
Information flows at port of loading
240(4)
The Endau purchase
241(1)
The Ng industrial order
242(1)
The golf shirts scenario
243(1)
Comparing the processes: maintaining the flow of commerce and protecting supply chains
244(2)
Manifests: types and uses
245(1)
Physical flows
245(1)
U.S. customs presence
246(1)
Information and documentation
246(5)
Physical and technological security measures
247(3)
Cyber issues
250(1)
Physical, technological, and cyber impacts on risk
251(2)
Port of Singapore
251(1)
Port of Vung Tau
252(1)
Port Muhammad Bin Qasim
253(1)
How does this tie together?
254(1)
Appendix A
255(2)
References
257(2)
Chapter 14 In-transit threats and risk management
259(22)
Jon S. Helmick
Introduction
260(1)
Threats and consequences
260(5)
Piracy and armed robbery
260(2)
Terrorism
262(1)
Cyberattack
263(2)
Risk management strategies
265(14)
Risk-based decision-making
265(1)
Conventions, codes, and regulations
266(2)
Governmental initiatives, policies, and guidance
268(1)
Industry guidelines
269(1)
Training, drills, and exercises
270(1)
Vessel security assessments and vessel security plans
271(2)
Voyage planning
273(2)
Rerouting and risk avoidance
275(1)
Military and paramilitary intervention
275(2)
Security systems and equipment
277(2)
Conclusion
279(1)
References
279(2)
Chapter 15 At US ports
281(14)
Ports illustrated
281(3)
Comparisons reveal contrasts
281(2)
Common carriage
283(1)
Roadblocks at ports
284(2)
Preparedness is paramount
286(3)
Opportunities abound
289(3)
The bottom line
292(1)
References
292(3)
Chapter 16 Routing analysis, risk, and resiliency
295(20)
Gary A. Gordon
Introduction
295(1)
General discussion of risk assessment models
296(3)
Transportation risk assessment models
299(1)
Maritime risk assessment models
300(3)
Maritime CARVER framework
303(7)
How does this benefit the industry?
310(1)
Where do we go from here?
311(1)
References
312(3)
PART VI The way forward: Recommendations
315(46)
Chapter 17 Systems considerations for Intermodal Maritime Security operations
317(20)
James H. Schreiner
System definitions and key concepts
318(1)
Maritime domain awareness using systems thinking
319(3)
Considerations for the intermodal Maritime Security System
322(7)
Summary
329(1)
References
329(8)
Chapter 18 Public policy and security partnerships
337(8)
Richard R. Young
Stemming the tide of drug smuggling
332(2)
Terrorism and changing international trade forever
334(3)
Partnerships to the fore
337(1)
The public--private partnership
338(1)
Internationalization of trade partnerships
339(3)
Summary
342(1)
References
343(1)
Further reading
344(1)
Chapter 19 Intermodal maritime security: where do we go from here?
345(16)
Gary A. Gordon
Richard R. Young
A high level overview of intermodal maritime security
347(1)
Thinking about the threats
348(1)
Physical flows
348(1)
Information flows
349(1)
Trading between related companies
349(1)
Security measures taxonomy
350(2)
Manual versus automated international trade documentation
352(1)
Technological and cyber threats that impact all aspects of the supply chain
353(1)
Vessel systems
353(1)
Cargo systems
353(1)
Government trade regulation
354(1)
Importers, exporters, and trade intermediaries
354(1)
Where do we go from here?
354(2)
Near-sourcing and crossborder shipments
355(1)
Resilience of supply chains
355(1)
Distributed decision-making, often done in a vacuum
356(1)
Where research can benefit intermodal maritime security?
356(2)
Systems theory
357(1)
Appendix A Security measures taxonomy assessment
358(2)
Domestic and international procedural processes
358(2)
Reference
360(1)
List of additional reading 361(2)
Index 363
Gary A. Gordon is a Professor of Professional Practice at the University of Massachusetts Lowell. He holds a Ph.D. and B.S in Civil Engineering, and MBA from the University of Massachusetts Lowell, and M.S. in Civil Engineering from the University of Maryland. Prior to academia, Dr. Gordon had a lengthy career in transportation operations, security and infrastructure design and construction, to include in the U.S. Army Reserve. During his career he held positions as Assistant Federal Security Director-Surface Transportation for DHS/Transportation Security Administration and Assistant Chief Engineer-Design & Construction of a former Class I Northeast Railroad. He is a co-editor of Intermodal Maritime Security: Supply Chain Risk Mitigation, co-author of Railway Security: Protecting Against Manmade and Natural Disasters and Securing Integrated Transportation Networks and is on the editorial board of the Journal of Transportation Security.

Richard R. Young is Distinguished Professor of Supply Chain Management at The Pennsylvania State University. He holds a B.S. in Operations Management from Rider University, M.B.A. from Albany University, and Ph.D. in Business Logistics from The Pennsylvania State University. Dr. Young is a fellow of the Chartered Institute of Logistics and Transport of the United Kingdom and is accepted to practice before the U.S. Federal Maritime Commission. Prior to academia, he held various supply chain management positions in industry. Dr. Young is on the editorial boards of several leading supply chain journals, a Fulbright German Research Scholar, and he received the 2008 Distinguished Educator Award of the National Défense Transportation Association. He is co-author of the book Railway Security: Protecting Against Manmade and Natural Disasters and co-editor of Intermodal Maritime Security: Supply Chain Risk Mitigation.