Verified Document

Transportation Security: Transportation Activities Account Research Paper

Moreover, various agencies have included compulsory deterrence and detection initiatives in order to further enhance transportation security. These agencies have also implemented practices that are geared towards detecting product tampering and theft. As part of enhancing the detection of transportation security, some of the most common practices that are used today include monitoring devices, surveillance cameras, quick-response capabilities, and satellite tracking. Since these strategies do not fully prevent security attacks in the global transportation industry, co-operation and coordination with international allies and partners is considered as an appropriate measure for preventing the transportation system from exploitation. Transportation security initiatives must be designed and harmonized globally since unilateral efforts are ineffective in preventing and mitigating security threats (Flynn, 2000). Actually, coordinated efforts promote security improvements in this system in the entire logistics and transportation networks.

The need for...

The various stakeholders in this industry including policy makers need to work together in designing and implementing measures that ensure the security of vital transportation and information elements. A Total Security Management Approach is one of the proposed measures that provide a needed framework for lessening these risks and securing global transportation networks. it's a comprehensive approach that integrates security sanctions through sound business practices.

Sources used in this document:
References:

Flynn, S.E. (2000, December). Transportation Security -- Agenda for the 21st Century. Retrieved June 24, 2012, from http://onlinepubs.trb.org/onlinepubs/security/sflynn.pdf

Ritter, L., Barrett, J.M. & Wilson, R. (2006, October). Securing Global Transportation

Networks: A Total Security Management Approach. Retrieved June 24, 2012, from http://www.manhattan-institute.org/securing_networks/
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now