CITATION

Ritter, Luke; Barrett, J. Michael; and Wilson, Rosalyn. Securing Global Transportation Networks: A Total Security Management Approach. US: McGraw-Hill Education, 2007.

Securing Global Transportation Networks: A Total Security Management Approach

Published:  2007

ISBN: 9780071709767 0071477519
  • Contents
  • Foreword
  • Total Security Management
  • Introduction
  • 1. Global Trade and Total Security Management
  • CHANGE AGENT #1: Globalization
  • CHANGE AGENT #2: Infrastructure and Economic Interdependencies
  • CHANGE AGENT #3: Discontinuous Events
  • Overview of Total Security Management
  • Conclusion
  • 2. The Total Security Management Framework
  • The Five Strategic Pillars
  • TSM’s Four Operational Enablers
  • The TSM Value Creation Model
  • Conclusion
  • 3. Creating Value: The Case for TSM
  • TSM and Return on Investment
  • The TSM Problem Solving Process
  • Conclusion
  • 4. The Risk Management Approach to TSM
  • Conclusion
  • 5. Securing Fixed Assets
  • ENABLER #1: Best Practices Implementation
  • ENABLER #2: Situational Awareness
  • ENABLER #3: Training and Exercises
  • ENABLER #4: Outreach
  • Applying the TSM Value Creation Model
  • Conclusion
  • 6. Securing Assets in Transit
  • ENABLER #1: Best Practices Implementation
  • ENABLER #2: Situational Awareness
  • ENABLER #3: Training and Exercises
  • ENABLER #4: Outreach
  • Applying the TSM Value Creation Model
  • Conclusion
  • 7. Securing Brand Equity and Goodwill
  • ENABLER #1: Best Practices Implementation
  • ENABLER #2: Situational Awareness
  • ENABLER #3: Training and Exercises
  • ENABLER #4: Outreach
  • The Brand Equity Equation
  • Applying the TSM Value Creation Model
  • Conclusion
  • 8. Securing Human Capital
  • ENABLER #1: Best Practices Implementation
  • ENABLER #2: Situational Awareness
  • ENABLER #3: Training and Exercises
  • ENABLER #4: Outreach
  • Applying the TSM Value Creation Model
  • Conclusion
  • 9. TSM and Business Continuity Planning
  • BCP Implementation
  • Conclusion
  • 10. The End of the Beginning
  • The Total Security Management Solution
  • A. Risk and Vulnerability Assessment Report Template
  • Table of Contents
  • I. Executive Summary
  • II. Assessment Background
  • III. The Risk Assessment Process
  • IV. Conclusions
  • B. Sample Value Chain Security Procedures for Chemical Firms
  • I. Purpose
  • II. Scope
  • III. Responsibilities
  • IV. Definitions
  • V. Procedures
  • VI. Education and Training
  • C. Seven Signs of Possible Terrorist Activity
  • I. Surveillance
  • II. Elicitation
  • III. Tests of Security
  • IV. Acquiring Supplies
  • V. Suspicious People Who Don’t Belong
  • VI. Dry Runs
  • VII. Deploying Assets/Getting Into Position
  • D. Sample Procedures for Handling Suspicious Packages
  • E. Total Security Management Glossary
  • Index