Containerized cargo security at the U.S. – Mexico border: how supply chain vulnerabilities impact processing times at land ports of entry
@article{Burns2019ContainerizedCS, title={Containerized cargo security at the U.S. – Mexico border: how supply chain vulnerabilities impact processing times at land ports of entry}, author={Maria G. Burns}, journal={Journal of Transportation Security}, year={2019}, volume={12}, pages={57-71} }
Nucleus of this research is to identify how the strategies of trucking and land transportation and logistics companies utilizing the U.S. Mexican border land routes affect border processing times, while providing policy recommendations for specific problems. Namely, this work identifies a link between delays and security at the border, as opposed to security risk-mitigation strategies by truckers on the Mexican side of the border. As higher volumes of containerized cargoes are processed at the…
2 Citations
Border crossings from Mexico to the U.S. and the role of border homicides
- EconomicsCrime, law, and social change
- 2021
This paper examines northbound crossings of personal vehicles and pedestrians from Mexico to the U.S. Sample size from January 1997 to December 2019 includes the period after December 2006 when then…
References
SHOWING 1-6 OF 6 REFERENCES
Participatory Operational & Security Assessment on homeland security risks: an empirical research method for improving security beyond the borders through public/private partnerships
- Computer ScienceJournal of Transportation Security
- 2018
This research has created a project-specific team of experts aiming to evaluate quantitative findings on border security, and offer best industry practices, as well as demonstrating the benefits of establishing a Public/Private Advisory Board in order to identify security threats on both sides of the border.
Estimating the impact of maritime security: financial tradeoffs between security and efficiency
- Computer Science
- 2013
The findings of this original study will assist transportation professionals in assessing the benefits of proactive security measures, and also help them verify the security-associated risks and consequences, while forecasting possible threats.
Towards process reference models for secure supply chains
- Business, Computer Science
- 2014
To what extent the current SCOR model accounts for state-of-the-art supply chain security concepts and requirements is critically assessed, to reveal respective shortcomings, and to lay the foundations for a secureSCOR model by investigating the suitability for conceptual security extensions.
The strategic attributes of transnational smuggling: Logistics flexibility and operational stealth in the facilitation of illicit trade
- Business
- 2014
The clandestine transportation of contraband cargo across national borders is commonly known as transnational smuggling. Illicit market actors utilize smuggling as a key strategic operation to get…
Logistics and Transportation Security: A Strategic, Tactical, and Operational Guide to Resilience
- Business
- 2015
This book discusses the latest information on transportation security. The topics discussed include the areas of hazardous material handling, securing transportation networks, logistics essentials,…
Port Management and Operations
- Business
- 2014
This sourcebook outlines best practices and industry developments for ports. Contents include: Port management and economic growth, Port ownership, Port workforce, Port operations, Port and terminal…