INSTRUCTIONS FOR RESPONDING TO PORTS SECURITY PLAN

سال انتشار: 1397
نوع سند: مقاله کنفرانسی
زبان: انگلیسی
مشاهده: 526

متن کامل این مقاله منتشر نشده است و فقط به صورت چکیده یا چکیده مبسوط در پایگاه موجود می باشد.
توضیح: معمولا کلیه مقالاتی که کمتر از ۵ صفحه باشند در پایگاه سیویلیکا اصل مقاله (فول تکست) محسوب نمی شوند و فقط کاربران عضو بدون کسر اعتبار می توانند فایل آنها را دریافت نمایند.

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این مقاله:

شناسه ملی سند علمی:

ICOPMAS13_018

تاریخ نمایه سازی: 6 بهمن 1397

چکیده مقاله:

The important role of ports for the support of economic activities in the hinterland since they act as a crucial connection between seas and lands transport, the totalvolume of goods handled in ports, and the large share of passenger transportation, indicate the position of seaports all over the world. Ports constitute an important economicactivity in coastal areas. The higher the throughput of goods and passenger’s year-on-year, the more infrastructures, provisions and associated services arerequired. One of these provisions and services, which every single port, as a kind of an infrastructure or complex, needs, is a security plan. The experiences about seas conflicts, specially during the first and the second world wars, the battle between Iran and Iraq and lots of other examples happened during the past century beside the unstable political situation in middle-east which leads to army and terrorist attacks, show why every single infrastructure or complex such as ports which could be attacked by an adversary, should be ready to be resistant. In other word, a security plan is a compulsory option, which is added to other management protocols. Security is complicated and is the result ofseveral factors. Some must always be present while the others will be added at specific moments and together they constitute the security plan. This paper will discuss abouthow to develop a security plan for ports in general. Then by using content analysis methodology in literature review of security risk assessment it will identify the factorsinfluencing the risk. These factors will be formed in a structure based on two validated and well-known methodologies for assessing security risk. Then, based onthis structure, the level of risk for the various components of a fictitious port will be determined. In this regard, according to the security experts familiar with the port equipment, the vulnerabilities of various port facilities will be identified. Validated checklists commensurate with what are common about components of the ports will be used. The reliability of the results of these surveys is measured and at the end of the paper, instructions or guidelines will be recommended to reduce vulnerabilities and to respond to ports security management plan.

نویسندگان

Zhila Hosseininezhad

Disaster Management Research Group, Passive Defense Complex, Malek Ashtar University of Technology, Tehran, Iran

Mohammadreza Fallah

aster Management Research Group, Passive Defense Complex, Malek Ashtar University of Technology,Tehran, Iran

Akram Barzegar

Disaster Management Research Group, Passive Defense Complex, Malek Ashtar University of Technology, Tehran, Iran

Hanieh Noorollahi

Disaster Management Research Group, Passive Defense Complex, Malek Ashtar University of Technology, Tehran, Iran