6 Jun 2022

55

Cargo Transportation Congestion and Transportation Security

Format: APA

Academic level: College

Paper type: Research Paper

Words: 5674

Pages: 4

Downloads: 0

Introduction 

Globally, the United States is ranked among the countries that possess the longest coastlines. Hence, the resource enables the state to engage in extensive transport activities, particularly regarding the importation and exportation of goods to other regions in the world. Apart from the movement of goods, the seaports act as entry ports for individuals from different global areas who need to access the U.S. The high level of activity of both goods and people increases congestion. Moreover, it presents additional security threats, especially about the movement of illegal products, such as firearms and drugs, as well as the risk of illegal immigrants. Congestion at the seaports is seen as the primary source of the emerging security concerns since it makes it very challenging for security officials to perform thorough inspections and checks, especially on each container and vessel moving through the seaports. As a result, terrorists and other criminals take advantage of the aspect of congestion to move terror-related equipment and gadgets or other illegal products that are used in harming the U.S. citizens. Moreover, the confusion that often occurs at the seaports due to the high movement of people makes it easy for illegal persons to enter the country, whereby some of these individuals could be terrorists. The issue of transportation security and congestion at the seaports became a vital issue of concern after the September 11 bombings in the U.S. The congestion was primarily associated with providing ideal conditions for terrorists to move illegal weapons into the country. For instance, given that it is nearly impossible for the security personnel at the ports to thoroughly examine each vessel and container, the risk of terrorists using bottles in the transportation of weapons and other dangerous materials increases. On the other hand, terrorists may also use the bottles as weapons of mass destruction by attacking the ports, which are often characterized by massive traffic of people. The U.S. has implemented several measures to combat the security threats that the country faces, particularly regarding the congestion at the seaports. For instance, in 2002, the state achieved the Maritime Transportation Security Act (MTSA), comprising strict provisions that aim at enhancing security in the shipping activities. However, most of these measures have proved ineffective in eliminating congestion and the security threats that the U.S. faces; hence, this paper examines the issue of transportation security and cargo transportation congestions at the port and highlights potential technological s  olutions that can be applied to address the problems. 

Literature Review 

Maritime transport in the U.S acts as a significant facilitator of trade both locally and internationally, and therefore, plays a vital role in the provision of efficient and low-cost transportation. The mode of transportation is significant since approximately 90% of the total international trade commodities are moved by sea. Vital components of logistics in the maritime transit are shipping and ports, and they are responsible for contributing to the efficient and effective administration of the flow of information, commodities, and materials in the supply chains. However, shipping and ports are regarded as the significant sources of uncertainty in the logistics and trade flows following the high concentration of goods that are transported, and which contribute to congestion in the ports. 

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

The uncertainty associated with the ports emanates from several events, including episodes of cyclones, floods, and earthquakes, which cause extensive damage to the ports. Other factors that largely affect the service quality and connectivity of seaports include the risk and safety management practices at the ports. From the global perspective, seaports and seaborne cargoes face the risk of severe accidents such as fire and explosions, as it was the case with Tianjin Port in 2015 (Bakshi & Gans, 2010). The damages emanating from such accidents are detrimental as they span from operational to disastrous from the context of levels of occurrence, and they range from natural to human-made risks. The major ports are vital in the supply chains that serve diverse roles since they involve the shipping networks that link different players in the supply chain. Therefore, any major accident or disruption occurring at a port contributes to significant business losses and interruptions, which further cause damaging effects to the economy of the country or regions affected. Hence, Bakshi and Gans (2010) emphasize the need for involved stakeholders in the supply chains and maritime transport providers to implement effective measures to understand potential risks and mitigate such risks. 

Factors Contributing to Congestion in the U.S. Seaports 

Congestion is a common feature among the seaports in the U.S and it closely associated with inefficiency and delays in the supply chain as well as increased security threats. The value and volume of the containerized goods that enter the U.S. are immense, and it continues to grow over the years. According to Leonard, Gallo, and Véronneau, (2015), approximately $423 billion gained entry into the U.S in about 15.8 million containers. Moreover, nearly half of the international commodities shipped through the U.S. in the year 2000 were containerized, and it is estimated that by 2020, the volume is likely to double. Presently, the majority of seaports in the U.S are overcrowded, mainly characterized by congested rail and truck access routes, shallow harbors, and narrow navigation channels. However, although these problems are identified early, there are challenges in addressing them accordingly, mainly due to such factors as complex environmental regulations, delays in granting permits, and disagreements about ways of disposing of the drenched material. Even though the ports are considerably shallow, the size of cargo ships has increased significantly over the years. For instance, giant oil tankers exceeded the capacity of all the ports along the Mexican Gulf and the East Coast; moreover, more shipping terminals are increasingly facing challenges in accommodating the large container ships, especially during the competitive seasons. However, the development of the ports remains slow due to frustrations of the budget cutbacks and costs at all government levels. Moreover, the entire waterways management structure lacks sufficient technology to aid in the effective management of seaport operations. 

Apart from the massive flow of goods and people in the seaports, congestion emanates from such other factors as chassis shortage, stormy weather, employee strikes, shortages of labor, unexpected increases in demand, as well as customs slowdown. There is a growing shortage of chassis since some carriers have pulled out of the business while others are planning to exit the business in the future. A number of the existing chassis also have maintenance issues and are therefore out of use. The high demand has resulted in higher costs, while the shortage contributes to delays at the seaports. On the other hand, the weather mostly affects shipping activities; the East Coast, for instance, has been affected mainly by frequent, prolonged storms that not only affect direct activities at the seaports but also lead to traffic delays, leading to congestion at the ports. 

Industrial action is also a common occurrence at the seaports; one of the most notable events is the 2012 dispute that occurred at the West Coast (Bichou, 2015). The strikes mainly emanate from changes in the work rules as well as truck maintenance initiatives. Labor shortages, especially those of truckers, significantly contribute to congestion at the ports. The number of people working as truckers is quickly declining as a resulting of older people retiring and fewer individuals entering the job market. Some of the factors associated with the low attractiveness of truck driving as a job include low wages compared to other careers and the fact that most young people view it as merely a job rather than a career. Spikes in demand also contribute to seaport congestion to a great extent. Often some seasonal products contribute to a significant increase in the cargo volume in the seaports; although the increase may be considered insignificant, it contributes to lower port efficiency since the ports are already busy and incapable of adequately handling their current operations. Finally, customs slowdowns, which contribute to the unavailability of customs officials at particular times cause congestions at the seaports. The absence of the customs officials contributes to delays in the clearance of cargo, further contributing to congestion at the ports. 

Security Issues Associated with the Sea Transport in the U.S 

The considerable value and number of containers that enter the U.S. port each year pose a significant concern regarding their use by terrorists. The movement of containers creates an ideal environment for terrorists to execute attacks that may cost the country billions in addition to the loss of lives. The U.S ensures protection against such attacks through the Bureau of Customs and Border Protection (CPB), which focuses on implementing protective measures against such attacks. One of the approaches that CPB applies is risk management approaches for screening containerized freight to establish potential irregularities. The bureau possesses an automated targeting system (ATS) that provides a risk score to every container that enters the U.S. waters. Using the obtained scores, a portion of the containers is then labeled for thorough examination (Williams, 2015). Containers may be inspected at different points including the U.S. port of entry, outside the U.S., and at their po   rt of entry. 

The value of multiple checks through different international customs eliminates any chance of undetected malicious content entering the United States’ borders. An extended form of oversight would ensure that terrorists and criminal elements along with illegal content are screened off before they are allowed to enter the US premises. To this end, Adam D. William’s STAMP and STPA port security framework provides a perfect foil to and the step by step process through which such a preventive model can be utilized. The STAMP model generates a high level control structure which for port security and includes descriptions of communications flowing between system levels. For security related responsibilities of port security stakeholders, decisions are based on the information that updates the current understanding of each process model variable. The process model variables of concern for port security are fairly consistent between all stakeholders, and thus were only listed for the ports of arrival and departure ( Williams, 2015). 

The CPB is responsible for ensuring that the ports are secure while ensuring minimal hindrance to trade and sufficient economic substitution between the rigor and frequency at which containers are examined and the speed of turning them around. According to Bichou (2017), the higher the number of containers that are inspected and the longer the time it takes to inspect each container, the lower the risk of such potential risks as biological or nuclear weapons or other weapons of mass destruction going undetected. 

The congestion emanating from the expanded assessment can likewise be impeding to exchange. In the short-run, unexpected compartment deferrals can cause costly store network interruptions. Bakshi and Gans (2010) gauge the expense of postponement every day to be approximately 0.5% of the estimation of a holder. Enhancing the hazard outline of these shippers, CBP means to decrease the quantity of compartments it needs to examine and, in the meantime, diminish the general dimension of fear mongering related dangers related with compartments that enter the U.S. In this way, individuals from C-TPAT confirm of-stash security costs that permit CBP to diminish expenses and dangers related to holder risks and examinations. C-TPAT participation is willful, and a focal financial impetus for participating in the program is the decrease in assessment weight to which individuals are unconstrained. 

These surveys reliably refer to two arrangements of concerns: the advantages to taking interest individuals have not been unmistakably laid out; and compelling approval of security profiles, and regular review of individuals to guarantee consistency, is inadequate. Much all the more disturbing is the apparent absence of meticulousness through which security assessments can be led. For instance, on two events columnists at ABC News have figured out how to dispatch atomic material into the U.S. in load compartments. Thus, the GAO indicates that its examiners have twice utilized manufactured archives to bring in radioactive material through the waterways. The objective of this research is to give a demonstrating structure to comprehend the financial trade-offs inserted in compartment review choices and to utilize this system to investigate strategy activities, for example, C-TPAT. In privately owned business there is an exchange between the expense of consistency with C-TPAT and the advantage of diminished blockage costs related to the review of its compartments. The U.S. government encounters an exchange between the protection advantage got from an expanded examination of approaching holders and the opposite effect of the subsequent blockage. 

The legislature should likewise take into consideration money related weight originating from the requirement for extra safety measures foundation. Given the activities of CBP and of exchanging organizations, psychological militants exchange off the expenses and advantages of endeavoring to invade a holder. Demonstrating the cooperation between CBP, exchanging firms, and fear mongers as a successive multiplayer amusement, utilizing the critical specialist system. CBP (the foremost) demonstrations initially, trailed by the exchanging organizations (specialists) and accordingly the fear-based oppressors. CBP first sets the dimensions of investigation recurrence and force (meticulousness), just as parameters for the review of individuals. 

Exchanging firms at that point choose whether to join C-TPAT or not, in light of their particular expenses of conforming to the security rules spread out in the program. At long last, fear-based oppressors pick which set of compartments to focus for penetration. Rudimentary contemplations inside our displaying approach infer that individuals' potential for good peril (evading) requires CBP to review them for consistency (Leonard, Gallo & Véronneau, 2015). Further investigation exhibits that a balanced result can be established and has the accompanying characteristics • Anan edge cost of consistency that isolates firms do or fail to link with C-TPAT. • An ideal review strategy that is resolvable autonomously of the ideal assessment arrangement. 

Security and safety at the seaports have been an issue of significant concern in the U.S.; however, the idea of enhancing physical security is one of the emerging aspects in seaport security. The idea largely emanates from the relationship between terrorism and other criminal activities that the ports are likely to facilitate. Such criminal activities thrive by exploiting the existing weaknesses in the cargo transportation systems as well as the port systems (Leonard, Gallo & Véronneau, 2015). For instance, the transportation systems provide an ideal environment for terrorists who seek to use a symbolic activity, such as severe interruption of the port activities by bombing such areas so that they can coerce regions into abiding by their ideological or political agenda. 

Moreover, criminals take advantage of the seaports and the transportation systems to profit from such activities as human and drug trafficking, piracy, and movement of weapons. Additionally, criminals use the channels to spread pandemics, particularly those involving biological weapons. Generally, seaports are risk areas especially for workers since they demonstrate high risks of accidents given the enormous amounts of goods that are moved and transferred from the ships to the trucks. Theft is also common in the seaports, a factor that is also linked to congestion and inadequate security systems (Leonard, Gallo & Véronneau, 2015). Despite the extensive worker education, theft of high-value commodities remains a crucial challenge for most seaports. Organized crime that makes it possible for theft of cargo, as well as the movement of illegal goods and immigrants is rampant. Hence there is a need to implement technological solutions that cannot be easily compromised. However, security personnel have been increasingly deployed in the areas, a factor that has helped to control theft, and the entry of illegal commodities and immigrants. Despite the efforts, the risk has not been eliminated since people can still risk moving illegal goods and commodities because only a proportion of the containers entering the U.S. is thoroughly inspected. 

In recent years, cybersecurity is one of the most visible security threats facing U.S. seaports. Firms engaging in transportation, as well as transportation infrastructures, are highly vulnerable since most of them have incorporated the use of information technology in their operations to improve efficiency and speed up their processes. Hackers can easily access the firm’s management systems remotely and alter their operations, a factor that can extensively disrupt operations at the seaports. This illustrates the need for technological solutions to the security concerns at the seaports that are not only effective but also safe from access by hackers and other cybercriminals. 

Abstract Thethe maritime industry is a crucial link to transport billions in goods each year to 

andAnd from countries throughout the world. This traditional mode of transportation has steadily 

grownGrown in importance, sustaining worldwide economic growth and the United States 

economyEconomy. It is generally agreed that an attack against an American port would have a 

long-lastingLong-lasting economic impact for the United States and its trading partners. Today ’ s Today s 

shippingShipping container is the primary asset used to move cargo aboard commercial shipping 

vesselsVessels. The containers are ubiquitous in our society with currently more than 34 million 

20-ft equivalent units (TEU) in use around the globe today (World Shipping Council 2014 ). 

The typical container used in shipping is a 20- or 40-ft enclosed container. These intermodal 

containersContainers have greatly enhanced the transportation industry but have also created immense 

securitySecurity susceptibilities. Millions of these co ntainers enter the U.S. every year, and only 

smallSmall percentages can be inspected. These containers have posed a significant opportunity 

forFor terrorist activities to employ weapons of mass destruction or biohazards within the 

continentalContinental United States. This paper provides a n overview of the current state and identifies 

whatWhat public and private security initiative e nhancements should take place toto? 

protectProtect the United States economy and homeland against terroristic activities. 

Results 

The above analysis demonstrates that there is a growing concern regarding congestion and security at the U.S seaports, which are critical to global commerce. The environment in which the seaports operate is also becoming increasingly complex, especially given the growing threat of terrorism. However, the current methods employed at the ports to enhance security are not sufficient to counter the growing security threats as well as to ease congestion, hence the need to implement more efficient technological solutions in the management of the seaports ( Ferraro & Bareley, 2011) . The present approaches aimed at ensuring port security are similar to the traditional accident causality models, which comprise of several security nets that are based on probabilistic assumptions and component reliability. As a result, traditional approaches lead to inconsistent and isolated security improvement strategies. Recent efforts in engineered safety include ideas of communication, control, emergence, and hierarchy into a new model that aids in the understanding of the concept of port security, which consists of a complex system. 

One of the newest models that seaports in the U.S have implemented in enhancing security is the System-Theoretic Accident Model and Process (STAMP) and is primarily based on the control and systems theory (Luca, 2016). The model works alongside the system-theoretic process analysis (STPA, which is responsible for identifying the specific procedural or technical security requirements that are designed to work together with the general port objectives. The process contributes to the design specifications of the port security, which are vital in eliminating or mitigating the vulnerabilities in port security that emanate from the lack of coordination between the key stakeholders in port security and the economic pressures that characterize the maritime industry. 

The major threats identified in the literature review include smuggling mass destruction weapons through containerization, cyber attacks that cripple port operations and attacking liquefied natural gas tankers. The threats pose the risk of extensive losses to both the seaports but also the local and global economy, which largely depends on the infrastructure to facilitate trade. These factors have profoundly influenced the shift of the security focus in the ports from that before the 9/11 attack to one that focuses on the threat of terrorism, which developed after the 9/11 attack ( Neely, Wigginton, Jensen & Keena, 2012) . Some of the approaches that the U.S has implemented to counter security threats relating to terrorism include the congressional mandate that requires that all incoming cargo containers must be scanned for radiological or nuclear material, implementation of more comprehensive methods of collecting data pertaining to the contents of the containers, and incorporating intelligence gathering into the risk management approaches of the ports to enhance the maritime domain awareness. 

However, the existing methods of ensuring port security are ineffective or insufficient, primarily, those relating to container scanning. According to Lewis, Erera, Nowak, and White (2013), the mandate to scan all the containers gaining access to the U.S. ports 100% is nearly impossible due to the vast number of containers in the ports. Such thorough scanning would contribute to further delays in clearing cargo, thus exacerbating the problem of congestion at the ports. Moreover, such measures would be expensive, therefore translating to a significant misuse of the taxpayers’ money. From this perspective, the concept of entirely securing the U.S seaports is a complex process, since it not only involves eliminating security threats but also considers enhancing efficiency in the activities of the ports to minimize delays that contribute to congestion. 

Eliminating security threats and promoting efficiency in the seaport operations is particularly crucial in minimizing disruptions to the global supply chain systems, which are most affected by security breaches at the ports. The supply chains are essential to the world economy, and potential disruptions at the ports contribute to massive recovery costs, which then impact the market value of the businesses that move their products through the supply chains (Hahn, 2015). For instance, in case a firm loses products to a terrorist attack targeting a seaport, the firm suffers losses in terms of money as well as creating product shortages in the market. To cover these costs, the firm would be forced to increase its product prices, which may work against their success, especially if the competing firms are offering their items at a lower price. 

In addition to the security threats relating to terrorist activities, seaports in the U.S are also highly vulnerable to natural disasters, which often contribute to the temporary closure of the ports. For instance, Hurricane Katrina led to the closure of the New Orleans ports for nearly two weeks in August 2015 ( Neely, Wigginton, Jensen & Keena, 2012) . However, unlike natural disasters, terrorist threats do not necessitate the closure of the ports although they severely disrupt the cargo transportation systems. However, the most common measure that officials at the ports take after a terrorist attack threat is suspending all traffic moving into the ports. Such suspensions contribute to extreme congestion at the ports as well as truck delays, which further disrupt production in industries that rely on the seaports for their raw materials and shipping of their finished product. 

Further, the literature demonstrates that achieving adequate security requires eliminating potential conflicts between different stakeholders. For instance, conflicts between individuals inspecting ships and those inspecting containers may lead to poor communication and interfere with the proper assessment of ships and the cargo, which increases the threat of terrorist activities. From this perspective, it is clear that there is a need to improve communication and coordination between the different parties engaged in the management of the ports. Moreover, there is a need to expand the concentric security layers that should focus on identifying the security control violations that can be controlled. For instance, instead of increasing the number of inspection points, the security team can create a dynamic and systematic inspection process, that is not only efficient but also plays a crucial role in eliminating the risk of potential security breaches. The inspection process should comprise of such critical indicators as inexplicable thermal signatures, unexpected gamma radiation that is detected, and threshold weight mismatches, which contribute to higher inspection levels. Besides, the analysis demonstrates the need to abstract the role of people in the ports in hierarchical control structures to replace the current systems that reduce their role to probabilities that relate to completing security procedures. 

Potential Solutions 

The port likewise emphatically bolsters the continuation of projects like the Customs-Trade Partnership Againstagainst Terrorism that boosted shippers to verify each progression in the inventory network. Landside security is of fundamental significance. The ports are expanding extra layers of security by creating investigation and sensors to all the more likely estimate the landside development of merchandise to and from the port, depend intensely on data innovation to work just as to verify the port and complex and its advantages. With expanded dependence on innovation comes the expansion on the capacity to digital assault. For instance, the port's data the executive's division effectively obstructs more than 30 million dangers a month (U.S Customs and Border Protection, 2018). Notwithstanding human-made digital dangers, the sea area is additionally powerless, as we as a whole know, to innovation interruption from common perils and fiascos. Business flexibility is an essential piece of the port's on-going cybersecurity arranging. Readiness, reaction, and recuperation arranging are fundamental to guarantee that we expect activities quickly. Conventions must be sure about how to best contain an episode to counteract further intrusion, and reaction groups more likely than not particular preparing and be set up to lock in. 

There is anything but a one-measure fit-all arrangement because each port has a unique plan of action. Our data the executive's division has created and actualized a venture wide on-line cybersecurity mindfulness preparing program. It is trusted that once digital tasks are comprehended on an endeavor level frameworks and conventions can be sorted out to ceaselessly advance cybersecurity all through the association ( Zhu & Zhai, 2017) . We likewise comprehend the significance of defenselessness evaluations to distinguish the organized holes that could prompt interferences influencing essential tasks. The port has experienced ordinary appraisals throughout the years and plans to proceed with this training. Our choices must be data-driven. A situation that advances the sharing of data which incorporates adjusting the need to secure property data, or independent data, with securing our National basic foundations ( Ferraro & Bareley, 2011) . Last, another and potential risk to wellbeing and security is that of unmanned flying frameworks. The unhindered activity of UAS close terminals and boats could represent an imminent risk to the port complex and tasks. UAS tasks in defenseless zones must be confined and neighborhood people on call ought to be esteemed the requirement substance approved to alleviate dangers. We trust this sort of authorization is better designated to nearby open wellbeing faculty working related to Government accomplices. 

Technological Solutions 

Cisco Systems' answer for seaports is a protected, brought together measures based correspondences framework enabling seaports to gain by rising security, operational, and cost-cutting chances. With a basic operational correspondence framework, center procedures can be combined crosswise over seaport activities, regardless of whether on the dock or in the workplace (Leonard, Gallo & Véronneau, 2015). A multiservice organize additionally can supplant various exclusive systems with a single design for all data—information, voice, or video—and empower seaports to utilize and scale their system speculation while sending or on the other hand coordinating new applications. Furthermore, colossal cost investment funds can be acknowledged because IP systems require less and less appropriate staff for the executives and support. 

Improved Security and Safety 

Arranged Video Surveillance Reconnaissance activities, including the utilization of advanced video to screen edges, passageways, and open spaces are among seaports' most squeezing needs. By presenting a common interchanges foundation, seaports can use multi-use, arrange empowered video instead of maturing, single-utilize simple shut circuit TV (CCTV) frameworks. Arranged video reconnaissance gives numerous favorable circumstances over conventional CCTV frameworks including: 

• Ease of recovery, stockpiling, and chronicling 

• Simultaneous account and observing of numerous video streams 

• Event remaking and relationship 

• Multiple checking and control stations for a solitary camera or video stream 

• Secure remote and portable checking 

• Improved framework adaptability 

• One camera, numerous reasons 

• Transport over a typical framework 

• Support for video conveyance to various gadgets (for instance, handheld PCs) 

Container Security 

Ports in the United States handle around six million approaching holders every year, or roughly 17,000 compartments every day. Nonetheless, auditors open just around two percent of these holders. A critical need for seaports is like this to guarantee the security of compartments and to keep unapproved parties from altering freight. Shippers are utilizing novel strategies, for example, seals with inserted radio-recurrence distinguishing proof (RFID) labels to identify compartment altering. Later on, RFID might be joined with worldwide situating frameworks (GPS) on boats, land transport vehicles, and gantry cranes to guarantee holder respectability while following and archiving compartment development and capacity. 

Notwithstanding guaranteeing that compartments stay unblemished, shippers, seaports, and Customs specialists must assess compartments to guarantee they don't hold prohibited merchandise, for example, stolen autos or weapons. Portable, noninvasive investigation frameworks are being utilized to consider the examination of holders with the least impact on the stream of business. These frameworks make low-goals pictures of freight inside holders, utilizing x-beam and gamma beam advances (Department of Homeland Security, 2014). These pictures can be explicitly seen, transmitted to suitable experts utilizing remote systems, or filed for later reference. Seaports are likewise conveying various other refined sensors to secure the total range of seaport activities and physical resources. Innovations, for example, insightful fence frameworks, synthetic also, natural finders, submerged cameras, and infrared border movement locators are different models. Rising biometric and remote detecting applications can be incredibly improved by a dynamic and adaptable system framework. The Cisco® regular correspondences framework for seaports makes a difference empower the coordination of principles based security frameworks through improved interchanges and data relationship. 

Moreover, verifying the stream of merchandise to and from the United States is a difficult mission, including governments, organizations, and non-benefit associations over the globe. Also, the Port of Long Beach speaks to a critical player in this mission. Together with these accomplices, the Port looks to verify the worldwide store network through an expansive scope of apparatuses including data sharing, hazard-based investigation, and the utilization of cutting edge innovations. While we comprehend Congressional enthusiasm for 100 percent filtering of all approaching payload at our Nation's ports, to do as such would block the stream of trade to a stop and require an extraordinary interest in innovation and workforce at every one of the many terminals the country over. A more prominent rate of profitability can be made by developing the dimension of commitment with worldwide accomplices and using ''enormous information'' to focus on those compartments that represent a concern. The Port unequivocally prescribes proceeding to put resources into projects, for example, Custom's Trade Partnership Againstagainst Terrorism that boosts shippers to verify each progression in the inventory network, instead of concentrating on a single advance all the while. As it identifies with ''enormous information'', the Port is effectively working with Federal accomplices to tap into their focusing on capacities to give a planned reaction to vessels and payloads of intrigue. 

The quantity of U.S. information ruptures crosswise over instructive establishments, shipping firms, Government organizations, military, medicinal offices, commercial firms, and different organizations hopped to a record to a record 791 in the initial a half year of 2017. This is a 29 percent expansion from a similar timeframe in 2016 (Romero-Faz & Camarero-Orive, 2017). Data innovation is an essential segment of the products development framework. The Port is firmly incorporated with different partners over the store network, and it is essential that information traded between partners is secured. Phishing efforts focusing on general port staff and partners have expanded by up to 70 percent all through the Nation. Digital assaults are progressively focusing on the divisions of the economy that have generally underspent in the data the executives and innovation territories. For both the private and open areas, it is a matter of when, not if, a digital assault will occur. 

The Port of Long Beach's Information Management Division effectively upsets more than 30,000,000 dangers per month. The objective is to construct a sustainable program that balances the need to secure against digital assaults while adjusting the need to run the Port's matter of fact. In this data time, innovations are outpacing conventional data security controls. The Port of Long Beach depends intensely on data innovation to work, as well as to verify the port complex and its advantages. Like different businesses, the sea division has seen an expansion in digital assaults, to a limited extent since ports are National monetary drivers and oversee basic foundation. That is the reason, notwithstanding above water, on water, and submerged security observing and risk identification, cybersecurity has turned into an essential undertaking for the Port. 

Private-area organizations, for example, terminal administrators, control a considerable segment of the Port's monetary action through a wide assortment of offices. In the port complex, the objectives for significant digital dangers incorporate; port organization offices, shippers, vessels, terminal working frameworks, gearand gear, storerooms, rail, and truck activities. Potential culprits who could complete digital assaults incorporate state-supported illegal gatherings and people, either incidental or deliberate. Digital dangers to the sea condition incorporate; hacking, sticking, phishing, ridiculing, malignant projects, taking control, and system disavowal of-administration (Romero-Faz & Camarero-Orive, 2017). 

A portion of the rousing elements for digital criminal exercises may include carrying, digital blackmail, picking up business advantage, licensed innovation robbery, and disturbing or devastating basic National framework. Notwithstanding human-made digital dangers, the sea area is additionally vulnerable to innovation disturbance from common risks, for example, quakes, storms, and torrents. Dangers to ports, what's more, their accomplices are unsafe to the significant number of specialists, voyagers, and guests in and around the port network (Williams, 2015). Combined with the potential cataclysmic financial effects, oceanic digital occasions could affect our National prosperity as much as, if not more than, different kinds of assaults. Business versatility has turned into an essential piece of the Port's on-going cybersecurity arranging. Diminishing the potential for single-point disappointment, incorporating excess with innovation frameworks, and framework recuperation back-up procedures are crucial to guaranteeing ports stay practical and continue tasks as quickly as conceivable in case of an episode. 

Reaction and recuperation are essential to active moderation and business resumption. Conventions must be sure about how to best contain an episode to counteract further interference, and reaction groups more likely than not specific preparing and be readied draw in the day in and day out. Conventions should clarify who gets notice of the occasion and what resources are accessible to help rapidly. In a port domain, a flexible coordinationscoordination fasten should almost certainly ingest a business intrusion and afterward rapidly continue an ethical dimension of products development (Bichou, 2017). To build up, a far-reaching strength intends to address cybersecurity, factors that ought to be tended to include: Framework needs and security, transportation frameworks, and advancement of business coherence plans. 

Various difficulties must be routed to improve cybersecurity in oceanic situations. There is anything but a one-estimate fits-all arrangement because each port has an alternate plan of action. An absence of mindfulness around an association's very own frameworks makes open doors for abuse at a fundamental dimension. Data innovation frameworks can be an interwoven of inheritance structures, some coordinated with more up to date innovations. These frameworks can be managed by administrators with a nearsighteda nearsighted center bringing about the ''siloing'' impact. The ''siloing'' impact isn't a data innovation issue. It is an authoritative and social issue that requires exertion to change (Talley, 2017). At the Port of Long Beach, there is an on-going exertion to adjust the venture Information Management work with the unique needs of the Security Division. 

Conclusion 

Seaport management is confronting an inexorably mind-boggling scope of operational difficulties in their administration of very unpredictable, multi-occupant port situations. Noteworthy aggressive difficulties, progressing work issues, and new security   prerequisites, such as the STAMP and STPA frameworks, ordered by the U.S. government and the International Maritime Association (IMO) are stressing effectively rare assets. Furthermore, these measures have proved effective in eliminating congestion and the security threats that the U.S. faces; hence, the purpose of this paper which was to examine the issue of transportation security and cargo transportation congestions at the port has been categorically achieved. In addition, Tthe need to securely deal with a regularly growing payload and traveler load is driving various port authorities to assess new advances that drive expanded proficiency, improved security, and income for port specialists, just as inhabitants. Notwithstanding the developing requirement for further developed applications and frameworks, the presentation of U.S. government projects, for example, the U.S. Customs Service's Container Security Initiative (CSI), pilot projects, for example, Operation Safe Commerce, and necessities in Part An of the new IMO-endorsed International Ship and Port Facility Security (ISPS) Code are putting exceptional weight on port administrators to advance and adjust rapidly to the new substances of port security. All these new advancements must be coordinated into a current port data foundation that, today, is frequently exceedingly divided crosswise over both port specialist furthermore, inhabitant activities. Port supervisors must utilize interests in security moves up to upgrade by and significant profitability. This is the future for port tasks. The thought of the "seaport of things to come" is quickly grabbing hold as experts progressively use organize driven advancements to improve: 

• Security of freight, including compartments, mass, and break-mass shipments, just as travelers 

• Decision-production and responsiveness • Compliance and correspondence with government associations and different ports   

• Flexibility and asset use 

• Satisfaction of terminal administrators and different inhabitants. A united correspondences framework is an essential empowering agent of integrated security and operational productivity. 

References 

Argueta, C. N. (2016). Border security: Immigration enforcement between ports of entry.  Congressional Research Service

Bakshi, N., &Gans, N. (2010). Securing the containerized supply chain: Analysis of government incentives for private investment. Management Science , 56 (2), 219-233. Retrieved March 20, 2019, from http://doi.org/10.1287/mnsc.1090.1105 

Bichou, K. (2017). The Port Security Framework.  Encyclopedia of Maritime and Offshore Engineering , 1-20. 

Bichou, K. (2015). The ISPS code and the cost of port compliance: an initial logistics and supply chain framework for port security assessment and management. In  Port Management  (pp. 109-137). Palgrave Macmillan, London. 

Department of Homeland Security (2014) Written testimony of PLCY, USCG, CBP, TSA, FEMA for a Senate Committee on HomelandSecurity and Governmental Affairs hearing titled"Evaluating Port Security: Progress Made andChallenges Ahead" Retrieved 7 February 2019 https://www.dhs.gov/news/2014/06/04/written-testimony-plcy-uscg-cbp-tsa-fema-senate-committee-homeland-security-and 

Ferraro, S., & Bareley, K. (2011). An exploration of shipping industry prevention of future 

terroristTerrorist attacks . ProQuest Dissertations Publishing. Retrieved from http://search.proquest.com/docview/884316982/ 

Homeland Security (2014) “Coastal Surveillance System” DHS Science and Technology Directorate Retrieved Match 8, 2019, from https://www.dhs.gov/sites/default/files/publications/Coastal%20Surveillance%20Systems-508.pdf 

Hahn, J. (2015). Existing Scanning Technology Can Secure Ports, International Commerce.  Sea Technology 56 (1), 40-41. 

Lam, J. S. L., Lun, Y. H. V., & Bell, M. G. H. (2018). Risk management in port and maritime logistics. Accident; Analysis and Prevention, Retrieved March 20, 2019, from doi:10.1016/j.aap.2018.04.003 

Leonard, T. J., Gallo, P., &Véronneau, S. (2015). Security challenges in the United States seaports: an overview. Journal of Transportation Security 8 (1-2), 41-49. 

Lewis, B., Erera, A., Nowak, M., & White, C. (2013). Managing Inventory in Global Supply Chains Facing Port-of-Entry Disruption Risks. Transportation Science , 47 (2), 162–180. https://doi.org/10.1287/trsc.1120.0406 

Luca, U. (2016) “Port security training and education in Europe—a framework and a roadmap to harmonization, Maritime Policy & Management” 43:5, 580-596, DOI:  10.1080/03088839.2015.1134830 

Neely, W., Wigginton, M., Jensen, C., & Keena, L. (2012). The perceived effectiveness of 

containerContainer security at seaports along the Gulf Coast . ProQuest Dissertations Publishing. Retrieved from http://search.proquest.com/docview/1288024040/ 

Prozzi, J., Bujanda, A., Rajbhandari, R., Kenney, M., Warner, J., Wilson, V., Cebelak, M. (2017). Preparing Texas' freight transportation system for 2055. Texas A&M Transportation Institute . Retrieved from http://tti.tamu.edu/documents/0-6809-1.pdf 

Talley, W. K. (2017).  Port economics . Routledge. 

Torres-Bennett, A (2014) “US Port Security Inin the Post 9/11 world” Sea Technology Retrieved March 20, 2019, from https://www.researchgate.net/publication/292539008_US_Port_Security_In_the_Post-911_World 

Romero-Faz, D.,&, &Camarero-Orive, A. (2017). Risk assessment of critical infrastructures–New parameters for commercial ports.  International Journal of Critical Infrastructure Protection 18 , 50-57. 

U.S Customs and Border Protection (2018) “Border Patrol Overview” Retrieved 7 February 2019 https://www.cbp.gov/border-security/along-us-borders/overview 

The United States Coast Guard Academy (2019) “Coast Guard Roles and Missions” Retrieved 7 February 2019 https://www.uscga.edu/roles-and-missions/ 

Williams, A. (2015). Beyond a series of security nets: applying STAMP & STPA to port 

securitySecurity. Journal of Transportation Security , 8 (3), 139–157. 

https://doi.org/10.1007/s12198-015-0161-y 

Zhu, R., &Zhai, Y. (2017). Research on the application of VRP theory in logistics transportation. In MATEC Web of Conferences (Vol. 100). Les Ulis: EDP Sciences. 

https://doi.org/10.1051/matecconf/201710005064 

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Cargo Transportation Congestion and Transportation Security.
https://studybounty.com/cargo-transportation-congestion-and-transportation-security-research-paper

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

17 Sep 2023
Logistics

The District Court - A Court of Record

I attended a landlord-tenant hearing at the Suffolk County District Court. The landlord, who wanted to evict the client due to failure to pay rent had already filed a complaint, which was availed to the client by the...

Words: 479

Pages: 2

Views: 176

17 Sep 2023
Logistics

How One Company Streamlined Their Product Returns Processing

Main Points The article posits that in the face of the rapidly increasing volume of goods flowing back through the supply chain, processing product returns has emerged as an essential activity for organizations....

Words: 610

Pages: 2

Views: 83

17 Sep 2023
Logistics

Transportation and Logistics Management Solutions

Logistic management creates value in an organizational supply chain by managing transport services that a firm offers to retailers using direct delivery of products. Transportation acts as a crucial component of...

Words: 310

Pages: 1

Views: 151

17 Sep 2023
Logistics

Sustainability Strategy | What is Sustainability?

Corporate development is achieved through definition and implementation of effective strategies that cover both long-term and short-term objectives. For companies to be able to develop a sustainable plan, there is a...

Words: 857

Pages: 3

Views: 104

17 Sep 2023
Logistics

Futureproofing Small Businesses: Guidelines for Adapting to New Technology

Introduction 4 Adoption of New Technologies as a Pre-requisite for Business Success 4 Background 4 Challenges and Barriers to the Adoption of New Technology 7 Fulfilling Dual Role 9 Serving Different Internal...

Words: 12204

Pages: 46

Views: 417

17 Sep 2023
Logistics

International Water Transport

In Europe, before the formation of the East Indian Trading Company, just a few extra quantities of goods from the East Indies made their way to this continent through a complicated sea trade route. During the late...

Words: 2831

Pages: 10

Views: 358

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration