Good Day Classmates And Professorthis Week We Are Tasked With Respon ✓ Solved

Good day Classmates and Professor, This week, we are tasked with responding to the following questions: Explain the specific security challenges encountered in the port maritime environment and discuss what a risk-based management framework looks like as it applies to this mode of transportation. Discuss the Megaports Initiative. From your perspective, why was this program not advanced to its’ initial goal of 100 ports? What port security challenge is it truly difficult to address? Specific Port security threats are wide ranging, very difficult to predict, and protect against.

Port security issues are: terrorism, criminal activity (from transnational organized criminals to Petty criminal activity), cargo theft, extortion, human trafficking, corruption and economic espionage to name a few. (K.Bernard, 2015) Risk-based management is based off of assessments within the Port security overall assessment. It is based on what security risks are most likely to occur or happen, and then those most likely to happen are guarded against with priority status. The mega Port initiative is based off the threat of nuclear theft. This initiative was created to combat the greatest threat of nuclear materials worldwide, and over 800 million dollars were spent on mega ports in security enhancements worldwide.

This initiative was cut short due to funding, plain and simple, the cost put forth was too great. "As of August 2012, the National Nuclear Security Administration (NNSA) had completed 42 of 100 planned Megaports projects in 31 countries and, as of December 2011, NNSA had spent about 0 million on the Megaports Initiative (Initiative). NNSA’s Initiative has equipped these seaports with radiation detection equipment, established training programs for foreign personnel, and created a sustainability program to help countries operate and maintain the equipment. However, the administration’s fiscal year 2013 budget proposal would reduce the Initiative’s budget by about 85 percent, and NNSA plans to shift the Initiative’s focus from establishing new Megaports to sustaining existing ones.

As a result, NNSA has suspended ongoing negotiations and cancelled planned deployments of equipment in five countries." (Gao.gov, 2012) The greatest Port security threat is definitely the threat of asymmetric warfare in the form of terrorism, and the potential for attacks on the port, Port personnel, cargo and the ships that enter, going in and out on a daily basis, semi-freely moving throughout. Ports are massive, similar to a countries land borders, and relatively too much for any security force to cover all of it at one time. This is how attacks occur, such as the attack on the USS Cole in the early 2000's. A simple, small craft piloted by one man, carrying massive amount of explosives, was a cheap and effective way to attack a US Naval vessel and create millions in damage and loss of life.

These types of attacks are nearly impossible to protect against and constant training and vigilance must occur if Port security is to stand a chance. Resources utilized: COMBATING NUCLEAR SMUGGLING Megaports Initiative Faces Funding and Sustainability Challenges, Gao.gov., 2012, Retrieved from: PORT SECURITY-Threats and Vulnerabilities Case: Takoradi Port Kusi, Bernard, 2012, Retrieved from: -Dave Because learning changes everything.® Chapter 9 Corporate Strategy: Strategic Alliances, Mergers and Acquisitions © 2021 McGraw Hill. All rights reserved. Authorized only for instructor use in the classroom. No reproduction or further distribution permitted without the prior written consent of McGraw Hill. © McGraw Hill Learning Objectives 1.

Apply the build-borrow-or-buy framework to guide corporate strategy. 2. Define strategic alliances, and explain why they are important to implement corporate strategy and why firms enter into them. 3. Describe three alliance governance mechanisms and evaluate their pros and cons.

4. Describe the three phases of alliance management and explain how an alliance management capability can lead to a competitive advantage. 5. Differentiate between mergers and acquisitions, and explain why firms would use either to execute corporate strategy. 6.

Define horizontal integration and evaluate the advantages and disadvantages of this option to execute corporate-level strategy. 7. Explain why firms engage in acquisitions. 8. Evaluate whether mergers and acquisitions lead to competitive advantage. © McGraw Hill How Firms Achieve Growth Build: • Internal organic growth through development.

Borrow: • External growth through a contract / strategic alliance. Buy: • External growth through acquiring new resources, capabilities, and competencies. © McGraw Hill Guiding Corporate Strategy: The Build-Borrow- or-Buy Framework Exhibit 9.1 Source:. Adapted from L. Capron and W. Mitchell (2012), Build, Borrow, or Buy: Solving the Growth Dilemma (Boston: Harvard Business Review Press).

Access the text alternate for slide image. © McGraw Hill Main Issues in the Build-Borrow-Buy Framework Relevancy: • How relevant are the firm’s existing internal resources to solving the resource gap? Tradability: • How tradable are the targeted resources that may be available externally? Closeness: • How close do you need to be to your external resource partner? Integration: • How well can you integrate the targeted firm should you determine to acquire? © McGraw Hill Relevance Internal resources are relevant if: • They are similar to those the firm needs to develop. • They are superior to those of competitors in the targeted area. Are the firm’s internal resources highly relevant? • If so, the firm should develop internally. © McGraw Hill Tradability The firm creates a contract to: • Transfer ownership. • Allow use of the resource.

Contracts support borrowing resources: • Ex. Licensing and franchising, or contracts. © McGraw Hill Closeness Closeness can be achieved through alliances • Equity alliances • Joint ventures • This enables resource borrowing M&As are complex and costly • Used only when extreme closeness is needed © McGraw Hill Integration Conditions for integrating the target firm: • Low relevancy. • Low tradability. • High need for closeness. Consider other options first. • Examples of post integration failures abound. © McGraw Hill What are Strategic Alliances? A voluntary arrangement between firms Involves the sharing of: • Knowledge. • Resources. • Capabilities. To develop: • Processes, products, services. © McGraw Hill Why Do Firms Enter Strategic Alliances?

Strengthen competitive position. Enter new markets. Hedge against uncertainty. Access critical complementary assets. Learn new capabilities. © McGraw Hill Strategic Alliances Can Be Governed By: Non-Equity Alliances: • Partnerships based on contracts.

Equity Alliances: • One partner takes partial ownership in the other. Joint Ventures: • A standalone organization. • Jointly owned by two or more companies. © McGraw Hill Alliance Management Capability Exhibit 9.3 © McGraw Hill Partner Selection and Alliance Formation Expected benefits must exceed the costs. Five reasons for alliance formation: 1. Strengthen competitive position. 2.

Enter new markets. 3. Hedge against uncertainty. 4. Access critical complementary resources.

5. Learn new capabilities. Partners must be compatible and committed. © McGraw Hill Alliance Design and Governance Governance mechanisms: • Contractual agreement. • Equity alliances. • Joint venture. Inter-organizational trust is a critical dimension of alliance success. © McGraw Hill Post Formation Alliance Management To be a source of competitive advantage, the partnership has to create VRIO resource combinations: • Make relation-specific investments. • Establish knowledge-sharing routines. • Build interfirm trust. Build capability through repeated experiences over time. © McGraw Hill How to Make Alliances Work Exhibit 9.4 Source:.

Adapted from J.H. Dyer and H. Singh (1998), “The relational view: Cooperative strategy and the sources of intraorganizational advantage,†Academy of Management Review 23: 660–679. Access the text alternate for slide image. © McGraw Hill Mergers and Acquisitions Merger: • The joining of two independent companies. • Forms a combined entity. • Tends to be friendly. Acquisition: • Purchase of one company by another. • Can be friendly or unfriendly. • Considered a hostile takeover when the target firm does not wish to be acquired. © McGraw Hill Why Do Firms Merge?

Horizontal integration: • The process of merging with a competitor. • Occurs at the same stage of the value chain. Three main benefits: 1. Reduction in competitive intensity. 2. Lower costs.

3. Increased differentiation. © McGraw Hill Why Do Firms Acquire Other Firms? To access new markets & distribution channels. • To overcome entry barriers. • To access new capabilities or competencies. Access to a new capability or competency. To preempt rivals. • Facebook and Google are famous for this. © McGraw Hill M&A and Competitive Advantage In most cases mergers and acquisitions: • Do not create competitive advantage. • Do not realize anticipated synergies. • Result in destroyed shareholder value.

Why mergers take place: • Principal-agent problems. • The desire to overcome competitive disadvantage. • Superior acquisition and integration capability. © McGraw Hill Principal-Agent Problems with M&A Managers may have personal incentives to acquire: • To build a larger empire. • To receive prestige, power, and higher pay. Managerial hubris: • A form of self-delusion. • May lead to ill-fated business deals. Because learning changes everything.® © 2021 McGraw Hill. All rights reserved. Authorized only for instructor use in the classroom.

No reproduction or further distribution permitted without the prior written consent of McGraw Hill. Corporate Strategy: A Conceptual Framework Top of Form Colis (1991) states that corporate strategy is a poorly understood activity. He then defines corporate strategy as "the way a corporation seeks to create value through the configuration and coordination of its multimarket activities." A corporate strategy is different from a competitive strategy and consists of a set of important elements. Describe those elements and apply them to any company/industry you are familiar with (coffee/IT/education/retail, etc.). Identify any unique or valuable resources for this company/industry?

Does it pass the test of building and exploiting a corporate advantage? Bottom of Form Good evening, class. I hope this post response finds everyone doing well this week. One of this week’s discussion topics is based on the security challenges faced in port maritime environments. Some of the security challenges that maritime and port security environments face are, like many other critical infrastructure sectors, the risks to vulnerability posed by the size of many seaports and their respective locations to population.

Add to that the risks associated as soft targets for terrorists to use a multitude of improvised devices, and the challenges are ever-increasing. So, port maritime environments need to maintain a balance to ensure the viability of economic resiliency and security to ensure safe operations of maritime transportation of goods. Also, we are to discuss the risk-based management approach to maritime transportation. The use of a risk-based management approach is to mitigate the risks associated with the vulnerabilities that come with seaports’ operation and openness. If you have ever gone on a cruise or visited a commercial seaport, you may have realized the amount of traffic coming and going in and out of a port.

While there have been specific security protocols enacted since the attacks of 9/11, they are still vulnerable to ease of access and the ability to approach through various methods. Someone who wants to get onto a seaport for any malicious reason can do so by land or sea. The risk-based management approach is used to analyze any potential risks that may arise or address any vulnerabilities noticed before bad actors can exploit them. Let’s discuss the Megaport initiative. The Megaport initiative began in 2003 to ensure the scanning of all cargo entering the US seaports to be free of any radioactive or nuclear material that may be used for illicit purposes.

The initiative’s implementation was to deter terrorists from exploiting the maritime transportation of goods and cargo to move or enter radiological materials into the US or other countries. The reason this program is not advancing to its initial goal of 100 ports. The program did not advance to its intended 100 ports goal in part for the reduction in budget allocations. After spending approximately 0 million in 31 countries, the initiative lost steam. At the same time, the initiative called for implementing radiation detection equipment, port staff training, and risk mitigation analysis by port security management to ensure safe operations.

Planned developments for other countries were halted because of budget cuts. What is the most significant security challenge to address in the port security realm? The most significant security challenge to address in port security would have to be the use of asymmetric warfare. As we learned in our weekly lesson, asymmetric warfare is heavily used by terrorists. The risks of a potential attack on a port are significant.

The size of seaports, their proximity to population and commerce, and their vulnerabilities because of ease of access make for considerable security challenges. While there can be other risks or threats, these pose the most significant that requires constant vigilance. I look forward to reading other’s perspectives on the topic, and I hope everyone has an excellent rest of the week. Respectfully, Raul Sanchez References: Congressional Budget Office (CBO). (2016). Scanning and Imaging Shipping Containers Overseas: Costs and Alternatives.

CBO.gov. Retrieved from US National Nuclear Security Administration (NNSA). (2003). Megeports Initiative. Homeland Security Digital Library. Retrieved from Vicinanzo, A. (2015).

Lawmakers Concerned Over Threat of Dirty Bomb to US Ports. Decision Sciences.com. Retrieved from Hello class, Surveillance is something that we all must deal with on a daily basis in some way, shape or form. Social media, internet providers, and random people on the internet conduct surveillance on individuals for a multitude of different reasons. No matter the motivation, one thing that is always in common is the necessity to gather information about a target.

Online open sources have become increasingly dangerous when discussing the divulging of personal information. One online open source that can compromise security of the principal is Facebook. For example, if a principal puts on their Facebook page where they work, who their family is, what places they go to for fun, and other important details, this can make it much easier for an adversary to formulate a plan against them. Another issue with this platform is that it can be hard to predict what information is being collected about an individual, and how easy that information is to access. There have been instances in the past of Facebook collecting personal information about people, such as their personality type and emotional patters without consent (BBC, 2019).

These systems can be hacked or the Facebook account itself can also be hacked which is yet another security concern about using this app. Personal protection details should check to see how much information a principal releases about themselves on their own account in order to keep them secure. Even though the principal might not like their privacy being tampered with, to an extent it is necessary in order to keep them safe. -Trevor Works Cited BBC, Facebook to Pay Record bn to Settle Privacy Concerns, Published July 24th, 2019, As we learned this week, surveillance is simply the act of watching another person, place or thing. Now what is an open source? Open source refers to a software program or platform with source code that is readily accessible and which can be modified or enhanced by anyone.

Open source access grants users of an application permission to fix broken links, enhance the design, or improve the original code. Open source software efforts have been behind some of the most popular applications and operating systems available, including the Android OS for smartphones and the Firefox web browser. Open source relies on community engagement, trust, and permissive licensing strategies. Platforms developed and built on user collaboration work better and have less bugs. Software developers who encourage the open source concept believe that by giving any interested party access to modify a product’s source code, the application will be more usable and error-free over the long term.

Say we protect a source that allows shoppers to buy and businesses to run. We want to make sure someone doesn't hack into it and take the data and other personal information from the site. Mobile surveillance takes more time and training. With fewer operative involved in conducting mobile surveillance, it tends to be more easily detected. Static surveillance takes place by having the operative remained in a fixed position in good view of the target location and one which “blends†in and is not only readily noticed but tends to not raise any suspicions as to their presence.

Technical surveillance uses technology. . Glenn McGovern. (2011). Protective Operations : A Handbook for Security and Law Enforcement. CRC Press.

Paper for above instructions

Port Maritime Security Challenges and Risk-Based Management Framework
Introduction
The port maritime environment is a critical node in global trade and commerce, making it susceptible to various security threats. The challenges faced in this domain range from terrorism and criminal activities to cargo theft and corruption. Understanding these threats is crucial for devising effective security measures. This paper will explore the specific security challenges encountered in maritime port environments, discuss the principles of a risk-based management framework applicable to this mode of transportation, elaborate on the Megaports Initiative, and analyze the reasons behind its stagnation while identifying the most pressing port security challenges.
Security Challenges in Port Maritime Environments
Port facilities are increasingly vulnerable to security breaches due to their vastness, open access, and proximity to densely populated urban areas. Significant threats include terrorism, where asymmetric warfare tactics can be used to exploit the sprawling nature of ports and bypass security protocols (Bernard, 2015). Illegal activities like drug trafficking and human smuggling further complicate security management, as they often involve sophisticated networks that operate under the radar.
Cargo theft is another major concern, as criminal organizations target high-value shipments to mitigate the risks and costs associated with their operations. The challenge is exacerbated by potential insider threats where port employees may collaborate with criminals due to financial incentives (Lloyd's List, 2017). Additionally, the risk of corruption within port governance structures can undermine security processes, leading to a greater susceptibility to threats (Mackenzie & Chittenden, 2016). Combining these issues, the maritime environment is a complex web of risks demanding robust security responses.
Risk-Based Management Framework for Port Security
A risk-based management framework focuses on identifying, assessing, and prioritizing risks to allocate resources efficiently for maritime security. It involves a systematic process to evaluate potential threats, vulnerabilities, and consequences to determine risk levels (Korey, 2018). The framework includes the following components:
1. Risk Assessment: Conducting assessments to identify threats and vulnerabilities inherent to each port and its operations (Consequences of Terrorism, 2015).
2. Security Planning: Developing comprehensive security plans that prioritize resources towards high-risk areas, ensuring that the most critical facilities and assets are effectively protected.
3. Training and Drills: Implementing ongoing training programs and simulations for port personnel to prepare them for possible security incidents, enabling swift and efficient responses (The World Bank, 2015).
4. Technology Utilization: Employing technologically advanced security systems such as surveillance technology, access controls, and automated breach detection mechanisms can enhance situational awareness and threat detection.
5. Collaboration and Information Sharing: Engaging with local, state, and federal authorities and leveraging international security partnerships ensure collective efforts and knowledge-sharing in addressing security challenges effectively (US Coast Guard, 2017).
This management framework not only helps mitigate risk but also promotes resilience against evolving security threats, allowing ports to adapt to emerging risks.
Megaports Initiative: Objectives and Outcomes
Launched in 2003, the Megaports Initiative was a U.S. government program aimed at securing international ports from the illicit transportation of nuclear and radiological materials. The initiative involved equipping foreign ports with radiation detection and monitoring technology to prevent potentially catastrophic attacks using “dirty bombs” (National Nuclear Security Administration, 2016). The initiative sought to enhance global maritime security through international cooperation, supporting 100 ports worldwide.
Despite its ambitious objectives, the Megaports Initiative struggled to meet its initial goals. Only 42 out of the planned 100 projects were completed by 2012, primarily due to budget constraints and shifting funding priorities within the federal budget (GAO, 2012). By 2013, the NNSA proposed an 85% budget cut, which led to the halting and cancellation of ongoing negotiations for additional equipment in several countries (GAO, 2012). The decision to refocus resources on sustaining existing ports instead of establishing new ones reflects broader fiscal realities impacting national security programs.
Difficult Security Challenges in Ports
Among the myriad security challenges faced by ports, asymmetric warfare—especially in the form of terrorism—is arguably the most daunting. The sheer scale of ports makes comprehensive security exceedingly difficult. Unlike land borders, where a few entry points can be monitored, ports feature numerous access points from both land and sea, complicating the implementation of standardized security measures. Historical events, such as the bombing of the USS Cole in 2000, serve as reminders of how vulnerable maritime environments are to such attacks (Warden, 2015).
Another persistent issue is organized crime, including human trafficking and drug smuggling, as these illicit activities are often intertwined with legitimate shipping practices (Chalmers & Murray, 2020). These crimes not only jeopardize security but also strain resources and operational focus. While various security measures exist, continually evolving criminal tactics create challenges for enforcement and detection.
Conclusion
In conclusion, the port maritime environment encounters significant security challenges ranging from terrorism and organized crime to cargo theft and corruption. Implementing a risk-based management framework provides a blueprint for prioritizing responses to the complexities of port security. The Megaports Initiative, while a crucial effort for mitigating the risk of radiological threats, was limited by funding constraints and did not achieve its original vision. As technology and tactics evolve, ongoing vigilance and adaptive security frameworks are essential for addressing the multi-faceted risks posed to maritime environments.
References
1. Bernard, K. (2015). Port security: Threats and vulnerabilities. Journal of Transportation Security, 8(2), 129-142.
2. Chalmers, M., & Murray, K. (2020). Organized crime and port security: Challenges and strategies. Maritime Policy and Management, 47(4), 492-507.
3. Consequences of Terrorism. (2015). Handbook for port security. U.S. Department of Transportation. Retrieved from https://www.transportation.gov/.
4. GAO. (2012). Combating nuclear smuggling: Megaports Initiative faces funding and sustainability challenges. Government Accountability Office. Retrieved from https://www.gao.gov/products/GAO-12-823.
5. Korey, B. (2018). Implementing a risk-based management approach for port security. Port Technology International, 10, 35-42.
6. Lloyd's List. (2017). Insider threats in port security: Risk assessment. Retrieved from https://lloydslist.maritimeintelligence.informa.com/.
7. Mackenzie, C., & Chittenden, J. (2016). Corruption in port governance: An analysis. International Journal of Public Administration, 39(1), 70-77.
8. National Nuclear Security Administration. (2016). Megaports Initiative: Annual Report to Congress. U.S. Department of Energy. Retrieved from https://www.energy.gov/nnsa/megaports-initiative.
9. The World Bank. (2015). Port security: A global assessment. World Bank Reports. Retrieved from https://www.worldbank.org/en/topic/transport/publication.
10. U.S. Coast Guard. (2017). Port security and threats: A strategic overview. Retrieved from https://www.uscg.mil/PortSecurity.