[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Flynn, 2006 - Google Patents

Port security is still a house of cards

Flynn, 2006

View PDF
Document ID
17319324340093971191
Author
Flynn S
Publication year
Publication venue
Far Eastern Economic Review

External Links

Snippet

As one of the world's busiest ports, it is fitting that Hong Kong played host to the World Trade Organization's December 2005 meeting. After all, seaports serve as the on-and off-ramps for the vast majority of traded goods. Still, the leaders of the 145 delegations that convened in …
Continue reading at www.researchgate.net (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading, distribution or shipping; Inventory or stock management, e.g. order filling, procurement or balancing against orders
    • G06Q10/083Shipping
    • G06Q10/0831Overseas transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce, e.g. shopping or e-commerce
    • G06Q30/01Customer relationship, e.g. warranty
    • G06Q30/018Business or product certification or verification
    • G06Q30/0185Product, service or business identity fraud

Similar Documents

Publication Publication Date Title
Haphuriwat et al. Deterring the smuggling of nuclear weapons in container freight through detection and retaliation
Flynn Port security is still a house of cards
Singh Maritime terrorism in Asia: An assessment
Kala et al. Cyber Preparedness in Maritime Industry
Tam et al. Forensic readiness within the maritime sector
Nincic The challenge of maritime terrorism: Threat identification, WMD and regime response
Bakir A brief analysis of threats and vulnerabilities in the maritime domain
Miranda Silgado Cyber-attacks: a digital threat reality affecting the maritime industry
Van Niekerk Vulnerability of south african commodity value chains to cyber incidents
Talas Port security
Ferrier et al. Using technology to bridge maritime security gaps
Roh et al. Risk assessment of maritime supply chain security in ports and waterways
Harrald Sea trade and security: An assessment of the post-9/11 reaction
Singh CYBER SECURITY IN MARITIME INDUSTRY The Exposures, Risks, Preventions and Legal Scenario
Min et al. X-ray cargo inspection for enhancing the maritime safety and security: a case study of international container ports
Van de Voort et al. Applying risk assessment to secure the containerized supply chain
Keefer Container port security: A layered defense strategy to protect the homeland and the international supply chain
Alifragki Cyber-Attacks: The new type of piracy in the Maritime World
Dadiani Cyber-security and marine insurance
Stodder The Challenge of Securing the Global Supply System
Szyliowicz et al. Maritime security: issues and challenges
Ports Port Security
Cheung Evaluation of the maritime security threats and issues to the future of the shipping industry–Maritime Autonomous Surface Ships
Helmick In-transit threats and risk management
Jackson The Need for a Maritime Cyber Risk Management Framework