• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/21

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

21 Cards in this Set

  • Front
  • Back
  • 3rd side (hint)
Security management
A corporate function that manages all of the security efforts of a particular company and coordinates the prevention of criminal activities against the company's employees, products, and assets.
Custom-Trade Partnership Against Terrorism (C-TPAT)
A voluntary partnership program between companies involved in international logistics and the U.S. Customs and Border Protection agency, in which companies that implement security measures obtain priority processing and reduced inspection rates.
International Ship and Port Facility Security (ISPS) Code
A series of security requirements placed by the International Maritime Organization upon ports and ships.
Contains two sections:
one specifies the required measures that a port has to put in place.
the other is a series of recommenddations for the implementation of of these measures.
Implementated in three ways:
1. they monitor tightly who has access to the port facilities. (i.d. cards for workers)
2. monitor ports via video surveilance and records are kept for weeks
3. ports have a secure system of communications designed to raise the alarm whenever a threat is detected.
International Convention for the Safety of Life at Sea (SOLAS)
An international convention, signed by 148 countries, that outlines the safety requirements that merchant ship owners must put in place.
interdiction
A security strategy that attempts to prevent all imports of potentially dangerous goods and all entries of potentially dangerous persons.
one-hundred-percent inspection
A security strategy that attempts to inspect all imported shipments for potentially dangerous goods
Type I error
A statistical concept whereby the researcher concludes that the null hypothesis should be rejected when, in reality, the null hypothesis is true and should have been accepted
Type II error
A statistical concept whereby the researcher concludes that the null hypothesis should be accepted when, in reality, the null hypothesis is false and should have been rejected.
Efforts by corporations to reduce the vulnerability of their international supply chain to more traditional criminal activities is called ___.
security management
The following factor(s) do NOT influence the type of security measures ports put in place?
size
Location and physical layout influence the technologies used by the ports to monitor for security, and the type of cargo determines the level of security. Size makes no difference.
The primary role of the World Customs Organization has traditionally been ___.
the simplification and harmonization of Customs' procedures
In addition to the C-TPAT program, the United States has also created which program(s) or initiative(s) to improve security?
a) Maritime Transportation Security Act


b) Security and Accountability For Every Port Act


c) Transportation Workers' Identification Credential


d) Container Security Initiative
The European Union based their security initiatives on which international organizations' guidelines?
The EU based their guidelines on the International Ship and Port Facilities Security Code of the International Maritime Organization, and then the SAFE framework of the World Customs' Organization
European countries have experienced significant violent attacks from which of the following terrorist group(s)
a) the Organisation de l'Armée Secrete


b) the Provisional Irish Republican Army


c) Rote Armee Fraktion


d) the Baader-Meinhof Gang
Which U.S. agency is NOT involved with security enforcement
secret service
In order to protect their fixed assets, companies should implement which of the following physical barriers?
a) build fences around the perimeter


b) lock all access doors


c) have enough outside lights


d) backup electric generators
When a security detection process determines that a cargo contains dangerous goods, even though the goods are innocuous (safe), what type of error is it?
Type I error
The policy of a one-hundred-percent inspection is considered flawed because ___.
a) the costs are staggering


b) the amount of room it requires is greater than what is normally available


c) the personnel needed is very large


d) it is ineffective
what are the different main international logistics security programs
international ship and port security code relative to ports
international ship and port security code relative to ships
security and facilitization in global environment
what are the problems with a security policy that is based on 100% inspection
very time consuming to actually do it
very costly
would result to terrible delays at ports
what are the four areas that a corporation must enact security measures to protect itself against theft
plants and buildings (fencing)
inbound and outbound shipment during transit (sealing containers)
information on which they rely to manege their operations (firewals)
their workforce (background checks)