• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 2
  • Tagged with
  • 4
  • 4
  • 4
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
1

Incorporating security into the transportation planning process

Denny, Brandon 17 March 2009 (has links)
The transportation system is an important network established to ensure the mobility of people and goods between destinations. In addition, it also serves a vital role in responding to disasters, and therefore deserves special attention when those disasters threaten to decrease its support capability. The task of securing a transportation system consisting of multiple interconnected assets is a complex responsibility. As an owner and operator of major transportation infrastructure, state Departments of Transportation (DOTs) have a vested interest in ensuring this balance and represent an important mediator between federal and local interests, assuming nine key security planning roles in their traditional transportation planning duties: Coordinator, Analyzer/Planner, Financial Administrator, Infrastructure Owner, Infrastructure Operator, Implementer, Regulator, Information Provider, and Influencer. Through their internal vulnerability assessments, the departments already perform a vital security planning function that can support their own planning efforts as well as others. Incorporating security into the transportation planning process requires modification as feedback of implementation methods is received. It does not mean transforming the DOT into a security agency, but rather incorporating a security perspective into the analysis of the system. This first involves establishing a more solid role as a coordinator in order to solidify vital linkages between agencies relevant to security planning. This interaction should reveal standardization issues the DOT can address in order to ensure effective collaboration, communication and coordination. Funding security measures may be difficult; but by incorporating security measures into initial analyzation and planning processes, they can be brought into the broader concept of the system rather than simply added as additional funding needs. The nine roles suggested earlier offer opportunities for state DOTs to overcome these and other challenges faced in the process of incorporating security into the transportation planning process. Through these roles, state DOTs can ensure that security efforts reach the parts of the system that require them and begin to build a more secure system.
2

High technology cargo theft: A new multibillion dollar criminal industry

Yakstas, John Robert 01 January 2001 (has links)
The central theme of this study is to explore the growth and causes of a relatively new form of "property crime" - the large scale theft of high technology products while the products are in transit from the point of manufacture to the point of market (retail stores, end users). For the purpose of this study, high technology products may be defined as computers, computer monitors, computer hard drives, microchips and other computer peripherals.
3

Hijacking of trucks with freight : a criminological analysis

Buys, Johannes Jacobus 11 1900 (has links)
A considerable amount of research has been done regarding the hijacking of passenger vehicles. Little however, has been written on the hijacking of trucks with freight. The purpose of the research was to describe the nature, occurrence and extent of the hijacking of trucks with freight, the persons involved (this includes the victims and the offenders) and the impact these crimes have on the crime scene in South Africa. The research also aimed to develop a criminological model for prevention, based on the modus operandi of the offenders. Based on the theories explaining violent and economic crimes (e.g. anomie, differential association and sub-culture), an attempt was also made to explain the hijacking of trucks with freight. / Criminology / M.A.
4

Hijacking of trucks with freight : a criminological analysis

Buys, Johannes Jacobus 11 1900 (has links)
A considerable amount of research has been done regarding the hijacking of passenger vehicles. Little however, has been written on the hijacking of trucks with freight. The purpose of the research was to describe the nature, occurrence and extent of the hijacking of trucks with freight, the persons involved (this includes the victims and the offenders) and the impact these crimes have on the crime scene in South Africa. The research also aimed to develop a criminological model for prevention, based on the modus operandi of the offenders. Based on the theories explaining violent and economic crimes (e.g. anomie, differential association and sub-culture), an attempt was also made to explain the hijacking of trucks with freight. / Criminology and Security Science / M.A.

Page generated in 0.1382 seconds