Participatory Operational & Security Assessment on homeland security risks: an empirical research method for improving security beyond the borders through public/private partnerships

  title={Participatory Operational \& Security Assessment on homeland security risks: an empirical research method for improving security beyond the borders through public/private partnerships},
  author={Maria G. Burns},
  journal={Journal of Transportation Security},
  • Maria G. Burns
  • Published 4 July 2018
  • Computer Science
  • Journal of Transportation Security
This paper proposes novel applications of Participatory Operational Assessment (POA), as a qualitative/empirical tool for bridging the research gap in our knowledge of Border Security, while supporting the mission of the U.S. Department of Homeland Security “to build in security, to ensure resilience, and to facilitate customs and exchange” (DHS 2017). Each year, global trade volume exceeds 10.3 billion tons of cargo, 90% of which is being carried by ships (UNCTAD 2017). U.S. transport networks… 
5 Citations
Containerized cargo security at the U.S. – Mexico border: how supply chain vulnerabilities impact processing times at land ports of entry
Nucleus of this research is to identify how the strategies of trucking and land transportation and logistics companies utilizing the U.S. Mexican border land routes affect border processing times,
Organisational Contexts of Energy Cybersecurity
The energy system is going through huge transformation to integrate distributed renewable generation and to achieve the goals of net-zero carbon emissions. This involves a significant adjustment to
EE-ISAC—Practical Cybersecurity Solution for the Energy Sector
This paper analyses EE-ISAC’s approach based on the conceptual applicability framework developed during the research, to improve the applicability and usefulness of this platform for energy sector participants and to identify areas that require further development.
Port Management
Transportation Safety and Security
  • Maria G. Burns
  • Computer Science
    International Encyclopedia of Transportation
  • 2021


Estimating the impact of maritime security: financial tradeoffs between security and efficiency
The findings of this original study will assist transportation professionals in assessing the benefits of proactive security measures, and also help them verify the security-associated risks and consequences, while forecasting possible threats.
Towards process reference models for secure supply chains
To what extent the current SCOR model accounts for state-of-the-art supply chain security concepts and requirements is critically assessed, to reveal respective shortcomings, and to lay the foundations for a secureSCOR model by investigating the suitability for conceptual security extensions.
The role of transnational smuggling operations in illicit supply chains
The flow of illicit goods and services within the global economy has fostered various black markets around the world. Complex illicit supply chain structures have developed to help support this
Maritime trade and piracy in the Gulf of Aden and the Indian Ocean (1994–2017)
From the 1990’s to early 2000’s, the modern face of maritime piracy has plagued the coast of Somalia impacting on one the world’s major shipping lanes of the international trade: The Gulf of Aden. In
Logistics and Transportation Security: A Strategic, Tactical, and Operational Guide to Resilience
This book discusses the latest information on transportation security. The topics discussed include the areas of hazardous material handling, securing transportation networks, logistics essentials,
The strategic attributes of transnational smuggling: Logistics flexibility and operational stealth in the facilitation of illicit trade
The clandestine transportation of contraband cargo across national borders is commonly known as transnational smuggling. Illicit market actors utilize smuggling as a key strategic operation to get
Socioeconomic development and the risk of maritime piracy
Maritime piracy is a phenomenon with implications for international trade. It is usually of two types: armed robbery and hijacking of vessels. This paper uses general estimating equations (GEE)
Optimizating cargo security during transport using dataloggers
This paper deals with cargo security and its optimization as a result of transport experiments. It also statistically evaluates these transport experiments with its emphasis on local extremes
Port Management and Operations
This sourcebook outlines best practices and industry developments for ports. Contents include: Port management and economic growth, Port ownership, Port workforce, Port operations, Port and terminal