Flynn, 2006 - Google Patents
Port security is still a house of cardsFlynn, 2006
View PDF- Document ID
- 17319324340093971191
- Author
- Flynn S
- Publication year
- Publication venue
- Far Eastern Economic Review
External Links
Snippet
As one of the world's busiest ports, it is fitting that Hong Kong played host to the World Trade Organization's December 2005 meeting. After all, seaports serve as the on-and off-ramps for the vast majority of traded goods. Still, the leaders of the 145 delegations that convened in …
- 238000004642 transportation engineering 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/08—Logistics, e.g. warehousing, loading, distribution or shipping; Inventory or stock management, e.g. order filling, procurement or balancing against orders
- G06Q10/083—Shipping
- G06Q10/0831—Overseas transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce, e.g. shopping or e-commerce
- G06Q30/01—Customer relationship, e.g. warranty
- G06Q30/018—Business or product certification or verification
- G06Q30/0185—Product, service or business identity fraud
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Haphuriwat et al. | Deterring the smuggling of nuclear weapons in container freight through detection and retaliation | |
Flynn | Port security is still a house of cards | |
Singh | Maritime terrorism in Asia: An assessment | |
Kala et al. | Cyber Preparedness in Maritime Industry | |
Tam et al. | Forensic readiness within the maritime sector | |
Nincic | The challenge of maritime terrorism: Threat identification, WMD and regime response | |
Bakir | A brief analysis of threats and vulnerabilities in the maritime domain | |
Miranda Silgado | Cyber-attacks: a digital threat reality affecting the maritime industry | |
Van Niekerk | Vulnerability of south african commodity value chains to cyber incidents | |
Talas | Port security | |
Ferrier et al. | Using technology to bridge maritime security gaps | |
Roh et al. | Risk assessment of maritime supply chain security in ports and waterways | |
Harrald | Sea trade and security: An assessment of the post-9/11 reaction | |
Singh | CYBER SECURITY IN MARITIME INDUSTRY The Exposures, Risks, Preventions and Legal Scenario | |
Min et al. | X-ray cargo inspection for enhancing the maritime safety and security: a case study of international container ports | |
Van de Voort et al. | Applying risk assessment to secure the containerized supply chain | |
Keefer | Container port security: A layered defense strategy to protect the homeland and the international supply chain | |
Alifragki | Cyber-Attacks: The new type of piracy in the Maritime World | |
Dadiani | Cyber-security and marine insurance | |
Stodder | The Challenge of Securing the Global Supply System | |
Szyliowicz et al. | Maritime security: issues and challenges | |
Ports | Port Security | |
Cheung | Evaluation of the maritime security threats and issues to the future of the shipping industry–Maritime Autonomous Surface Ships | |
Helmick | In-transit threats and risk management | |
Jackson | The Need for a Maritime Cyber Risk Management Framework |