Loading...
Please wait, while we are loading the content...
Similar Documents
Securing Global Transportation Networks: A Total Security Management Approach
| Content Provider | Semantic Scholar |
|---|---|
| Author | Ritter, Luke Barrett, J. Michael Wilson, Rosalyn |
| Copyright Year | 2006 |
| Abstract | Since September 11, 2001, the international transportation network has had the formidable task of creating and implementing security measures that protect the transportation network and can also be viewed as an integral part of the global economy providing added value to businesses and products. Total Security Management (TSM) provides just such a powerful and novel approach to security for the transportation network and business community. Security is good business. The authors present and discuss the five basic fundamentals for TSM: 1. Total security practices must be based on creating value that can be measured. More secure packaging, for instance, can eliminate extended inspections thus reducing overall production to user time and costs while providing a more secure environment. 2. Total security includes everyone along the value chain. A disruption in any segment of the business chain, from field to store shelf, affects the entire network and therefore all linking elements must be secure to minimize risks and maximize uninterrupted business to consumer value. 3. Total security implies and requires continual improvement. TSM is a continuous process. Being ever vigilant to changes in potential threats, assessing vulnerabilities, instituting reviews and revisions as necessary and testing existing plans for threat detection is mandatory to maintain a secure environment. 4. Total security helps minimize and survive disruptive events. Being well prepared reduces the resulting recovery period thereby saving money and can be effective in anticipating a potential threatening situation. 5. Total security requires business continuity planning as an essential business function. It is prudent for every business to anticipate and plan for disruption recovery by investing the resources necessary to minimize the time, effort and cost of the resumption of business. |
| File Format | PDF HTM / HTML |
| Alternate Webpage(s) | http://diligentinnovations.com/published/BookExcerptofSGTN_WorldTradeMagazine.pdf |
| Alternate Webpage(s) | http://web.mit.edu/sheffi/www/selectedMedia/dcvelocity_11-06_securitycomplex.pdf |
| Language | English |
| Access Restriction | Open |
| Content Type | Text |
| Resource Type | Article |