Verified Document

Cargo Security Management Issues Term Paper

Cargo Security Management: How Digitization Can Help Safeguard the Shipping Abstract

This paper examines how digitization can help safeguard the shipping industry by providing security monitoring of cargo, communications for shipping vessels, better surveillance for ports, and better protection through a number of technologies made possible by digitization services. Relevant literature is examined and perspectives on digitization are compared and contrasted to reveal strengths and weaknesses of the adoption of digitization in cargo security management. The paper concludes with a recommendation on whether digitization should be implemented in the industry or avoided because of costs to updating infrastructure.

Introduction

In the field of cargo security management, technology plays a pivotal role, not only in how shipping is managed but also in how far risk is mitigated and security established through systems-wide control mechanisms. To help protect cargo and supply chains, digitization has been shown to be an effective approach that can allow businesses and stakeholders to more effectively monitor the movement of goods and inspect cargo to ensure safety and reduce the threat of terroristic activity gaining a foothold in the movement of cargo (Fruth & Teuteberg, 2017). However, not all ports are created equally and some are more advanced in terms of providing digitization services to better effect the security of cargo. This paper will compare and contrast the issues surrounding this topic of security through digitization as a way to combat terrorism in cargo security management.

Literature Review

As Fruth and Teuteberg (2017) point out, the health of the global economical is critically linked to the safety of the world’s ports and the protection of the cargo that goes in and out of those ports. Over the past two and a half decades, cargo traffic has grown by approximately 10% year over year and more and more ships have grown in size to reflect the growth in shipping. Because of the sheer size and capacity of cargo supplies in today’s day and age, it stands to reason that digitization could help provide cargo security managers with the type of Big Data that can be used to better manage cargo-related logistics (Fruth & Teuteberg, 2017). Digitization of processes can better ensure “efficiency, safety and energy saving” (Fruth & Teuteberg, 2017), but there are also risks in handling Big Data, as well—such as the threat of cyber attack, cyber hack, and Big Data being sold or leaked to third parties. Rahman, Saifullah and Dhaka (2016) show that “demand pressure for a digitalized commercial environment” is growing in the cargo security management field and that a globalized world in a technologically-advanced day and age essentially insists that digitization be more thoroughly incorporated into cargo management services at ports around the world (p. 267).

Digitization can help to combat terrorist threats in cargo security management by linking ports as well. Helig Schwarze and Vob (2017) have shown that “as actors in world-wide supply chains, seaports are particularly affected by technological change,” which means they should respond to technological change in a...

Parts of this document are hidden

View Full Document
svg-one

Yet digitization is also needed in order to ensure that cargo shippers can remain strong within an industry shifting towards digitization. As Helig et al. (2017) note, “due to the high requirements in the logistics sector, e.g., regarding costs, efficiency, security, and sustainability, digital innovation is essential to stay competitive” (p. 1341). In short, digitization is here to stay as a result of the technological revolution of the Information Age. If it is not incorporated into a cargo security management policy, the supply chain overseen will be weakened as a result.
Implementing an effective digitization strategy can be complicated, however—and costly. For that reason, it is important that stakeholders band together to cover costs so that a uniform approach can be conducted. Ahokas, Kiiski, Malmsten and Ojala (2017) state that there are numerous ways that states and non-government operators alike can more effectively manage cargo security: The first way they point out is that managers can “commercialize their own cyberskills and cooperate with national or other non-governmental operators” (p. 11). This means that by working together with various other stakeholders in the supply chain, a more comprehensive safeguard of cargo can be accomplished. The second way the researchers point out is that managers can “form different alliances, for instance with national authorities that can offer them cyberskills” (Ahokas et al., 2017, p. 11). By forming alliances, cargo security managers can better effect a unified front against the threat of terrorism as they work to make sure that cargo is at all times safely being monitored, tracked, and overseen.

Ahokas et al. (2017) identify the risks inherent in using digitization tools, as Fruth and Teuteberg (2017) do, but they argue that “even though cyberspace can be used for malicious operations, it has established a platform for new innovations, such as digitalization, virtualization and automation. Thanks to these innovations, organizations have been able to cute various intermediaries from their production and service chains” (Ahokas et al., 2017, p. 11). By doing so, costs can be saved and these savings can be invested in the digitalized infrastructure needed to safeguard cargo. That infrastructure can be manifested in a variety of forms—including in the use of tracking technologies, surveillance systems, sensors, wireless tech, mobile equipment, drones, 3D printing, and analytics. As Heilig et al. (2017) note, these technologies represent a valuable way to help ensure that cargo is shipped on time, that security is guaranteed, that port capacity is maximized, the process efficiency is supported, and that costs are reduced for cargo operators, port operators, and shipping clients. In fact, Heilig et al (2017) show that industry leaders have more and more turned to implement digitization simply to better serve their clients.

Thus, in spite of the costs associated with upgrading infrastructures to include digitization technology, the savings and security that this technology can provide can be worth it in the long run. Plus, the fact that digitization is not going away…

Sources used in this document:

References

Ahokas, J., Kiiski, T., Malmsten, J., & Ojala, L. (2017). Cybersecurity in ports: a conceptual approach. In Proceedings of the Hamburg International Conference of Logistics (HICL)(pp. 343-359).

Fruth, M., & Teuteberg, F. (2017). Digitization in maritime logistics—What is there and what is missing?. Cogent Business & Management, 4(1), 1411066.

Heilig, L., Schwarze, S. & Vob, S. (2017) An analysis of digital transformation in the history and future of modern ports. Proceedings of the 50th Hawaii International Conference on System Sciences, 1341-1350.

Meier, J. (2013) Interview with Mr. Jens Meier. Shippers’ Journal Retrieved from http://www.bvl.de/files/429/883/Shippers_Journal_Interview_Interview_with_Mr._Jens_Meier.pdf

Rahman, M., Saifullah, A. Z. A., & Dhaka, B. (2016). The effectiveness of container inspection systems (CIS) on ports management in Bangladesh. International Journal of Engineering and Management Research (IJEMR), 6(5), 267-272.


Cite this Document:
Copy Bibliography Citation

Related Documents

Technology in Film Fred Ott Was the
Words: 1898 Length: 6 Document Type: Essay

Technology in Film Fred Ott was the very first movie star that every existed. His brief starring role in the five-second film that showed him sneezing started the use of technology to make films. Since then, technology both in and out of film has changed immeasurably and what technology is used and is said about technology in these same films has evolved quite a lot and the statements sometimes made are

Technology Proposal Social Networking and
Words: 1070 Length: 4 Document Type: Term Paper

Creating an effective library social networking platform needs to start with a view of how to create a content management system (CMS) first (Dickson, Holley, 2010). The CMS serves as the system of record of all catalog and collection items, providing valuable statistics on how each book, content and collection item is being used (Shapira, Zabar, 2011). This is extremely valuable information for each department in the library to

Technology for Students With Disabilities
Words: 3214 Length: 11 Document Type: Research Paper

These benefits arise because of implementing both assistive technologies and Information Communication technology (ICT). The implementation of technology in classrooms usually has benefits to both the disabled students as well as the teachers (Kirk, Gallagher, Coleman, & Anastasiow, 2012, p.240). The general benefits of use of assistive technologies and ICT in teaching students with learning disabilities include greater learner autonomy and unlocking hidden potential with those with communication difficulties.

Technology in the Workplace the
Words: 2715 Length: 9 Document Type: Research Paper

Instead, organizations must strike a balance between the autonomy and independence offered by technology in the workplace and the need for employees to have some level of formal and informal commitment to the organization as a whole. Just as seemingly counterproductive activities such as doodling, daydreaming, or, in the information age, surfing the internet, can actually contribute to efficiency by offering employees productive mental stimulation, so too can the

Technology in the Classroom in Today's Society,
Words: 3260 Length: 10 Document Type: Research Paper

Technology in the Classroom In today's society, technology has become an accepted medium for communication. From email correspondence that has taken the place of mail, to texting instead of talking, advances in technology have become integrated into our daily lives. However, the line should be drawn when it comes to technology impeding academics and being incorporated into the classroom. Although many support the notion of technology in the class, others see

Technology Acceptance Model Tam and Information Systems Success...
Words: 4229 Length: 15 Document Type: Literature Review

Technology Acceptance Model Using Technology Acceptance Model (TAM) to Assess User Intentions and Satisfaction on Software as a Service (SaaS): The Value of SaaS Software as a Service (SaaS) was researched by Benlian and Hess (2011) in an effort to determine its value to companies. Among the arguments was that SaaS is already declining in popularity even though it is very new. The majority of the arguments that lean in that direction have

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now