StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...

Interventions in Curbing Aircraft Security - Research Paper Example

Comments (0) Cite this document
Summary
It cannot be dispensed that airport security remains one of the issues of serious concern for most airports in the world since it also touches on safety. As such, airport security comprises of various methods and techniques that are aimed at protecting aircrafts, as well as…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98.4% of users find it useful
Interventions in Curbing Aircraft Security
Read Text Preview

Extract of sample "Interventions in Curbing Aircraft Security"

Download file to see previous pages Current interventions pertaining to airport security are dependent upon technological advancements. One of the pivotal airport security technologies pertains to the use of advanced imaging technology. Most common incidents pertaining to aircraft hijacking are attributable to allowing travelers board planes with weapons or items that could be utilized as weapons to facilitate plane hijacking. Currently, in most airports around the world, travelers are subjected to screening by use of metal detectors. Common explosive detector machines applied in airport security include X-ray machines and buffer machines, which are also referred to as the explosive trace-detection machines. In the United States of America, TSA is developing new airport security scanning machines that only effective in detecting illegal objects in the airports, but also those that are so flexible enough that they do not subject travelers to embarrassing states such as undressing. Explosive detection machines are also applied for checked, as well as, the carry-on baggage. The explosive detection machines can detect volatile substances that emanate from explosives, and utilize gas chromatography technique.
The most conspicuous, yet most controversial of the recent developments is the application of backscatter X-rays to sense hidden explosives and weapons that are hidden on passengers. Such device utilizes the Compton’s scattering technique, which requires travelers to stand near a planar panel so as to produce images with high resolution. In 2008, a technology that allows passengers to walk through the metal detectors without necessarily removing their shoes was advanced and adopted by Israel. This followed the pre-existing devices that were not reliable at detecting metal hidden on shoes or extreme lower parts of the body. However, whereas technologies play a pivotal role in the safeguarding security at airports, some countries go extra miles to employ specially trained personnel whose role is to engage travelers in conversations so as to detect potential threats, rather than solely rely on technologies (US General Accounting Office, 2003). ...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(Interventions in Curbing Aircraft Security Research Paper, n.d.)
Interventions in Curbing Aircraft Security Research Paper. Retrieved from https://studentshare.org/military/1593908-airport-security-their-loop-holes-and-solution-proposal
(Interventions in Curbing Aircraft Security Research Paper)
Interventions in Curbing Aircraft Security Research Paper. https://studentshare.org/military/1593908-airport-security-their-loop-holes-and-solution-proposal.
“Interventions in Curbing Aircraft Security Research Paper”, n.d. https://studentshare.org/military/1593908-airport-security-their-loop-holes-and-solution-proposal.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Interventions in Curbing Aircraft Security

Curbing Obesity in School Children

... among the kids. Controlling obesity will help curb some other diseases such as high blood pressure, cholesterol, sleep amnea and diabetes. At the same time if a child becomes obese at early age it will increase the chances of that child being obese at adolescence or adult age together with all accompanying health complications. The problem will also help reduce the health care cost. The model is best fit for the program because it provides a means of new behavioral research in health. The model explains how human beings acquire some behaviors and it provides basis for intervention. It will provide knowledge on how some kids acquire their eating behavior and the solution on how to change it. References H. Dele Davies and Vasiliki Mousouli...
7 Pages (1750 words) Essay

DYNAMIC AIRCRAFT

... Dynamic Aircraft Case Report Action to be taken by Mr. Marshall In this case, I think Mr. Marshall meets and exceeds the reputation he has developed with the way he dealt with the whole situation. As a conscientious person who is keen on acquiring the necessary knowledge on the commodities he purchases, Mr. Marshall goes to great lengths to ensure that the best wire is purchased. After receiving the recommendation from the engineering department that he should purchase Advanced Wire’s ceramic-coated wire, Mr. Marshall went ahead to ascertain whether this was the best wire available in the market at the best price possible. First and foremost, Mr. Marshall got the wire specifications that the engineering department demanded for. He did...
4 Pages (1000 words) Assignment

Healthcare Interventions

...Report on the Evidence that you can use to Support Interventions for Specific Aspect of Alcohol dependence Health Care Practice Submitted by Prepared by Word count 2418 words (excluding content and reference pages) Report on the Evidence That you can use to Support Interventions for a Specific Aspect of Alcohol dependence Health Care Practice 1. Introduction Evidence is an important fact that decides the course of treatment. The result, relapse or development in the condition of the patient can be termed as evidence in continuing the therapy or to make a change in it. They can be termed as interventions. According to that the report on the evidence to support interventions is important for any health care practice, especially...
10 Pages (2500 words) Essay

C130 Aircraft

The C-130 Aircraft also known as the Lockheed C-130 Hercules is a four-engine aircraft build by Lockheed during the 1950s. It is been serving since many years as a transport aircraft for military. This aircraft was originally developed as an assault transport. This was later used for a variety of missions such as:
The C-130 aircraft is capable of traveling through rough, dirt strips. It is the basic mean of transport where paratroop and dropping of equipment is concerned for hostile regions all around the globe.
It is the only aircraft that is in a process of continuous production for more than 50 years and have been participating in a huge number of missions of aid for humanity, military and civilian. With its original p...
8 Pages (2000 words) Essay

Commercial Aircraft

...Running head: Low cost and realistic benefits from Commercial Aircraft Commercial Aircraft is the perfect transport For the busy executives to save time as well as money. It seems that Executives experience hesitation, whether they use automobile or commercial aircraft or general aircraft to move from BNA to BAB. For their perfect decision, we have done a statistical research to show them the real benefits. We show in our research the comparison among automobile, general aircraft and commercial aircraft. In this research paper, we consider information from Delta Airline for conducting our research. It seems that Delta Company offers low fare and much better service...
7 Pages (1750 words) Research Paper

Aircraft Icing

... conditions, ice forms naturally. An aircraft, despite its size and shape, has no control over formation of ice over its surface. Deicing and anti-icing treatment helps ward off icing on aircraft surface. But even with these treatments, it is necessary to be on the lookout for sneaky icing to happen unobtrusively. Flying through snow may not cause ice formation but it leads to frosting on the plane surface which in turn can cause heavy icing. No region in the world can boast of ice-free aviation condition. Icing is not known as the silent killer for nothing. It has taken heavy toll arising from complacency and lack of vigilance. Early in the 1940s when the problem of icing began to get noticed, people in the aviation industry did not view...
7 Pages (1750 words) Research Paper

Aircraft Accident

...Memo G. W. Bush, CEO W. B. Clinton, Director of Engineering February 7, 2009 Looking into the possible manufacturing defects in the aircraft which resulted in the crash of July 1989 DC-10 United Airlines Flight 232. On the afternoon of July 19, 2009 the United flight 232 was destined for Chicago from Denver. It was being piloted by Captain Al Haynes along with ten of his colleagues and 285 passengers. After crossing into Iowa, a loud bang was heard from the rear of the aircraft, indicating engine failure. Thereafter the aircraft became almost uncontrollable. Passengers were alerted and the cockpit crew members were making frantic efforts to somehow keep the plane in a straighter direction. Despite best efforts, the airspeed and sink...
5 Pages (1250 words) Case Study

Interventions

...Interventions – One-to-One Training Introduction In the fast changing business world employees and job roles are altering at a quick pace. Training programs have to be flexible to meet this new challenge in the business world. One-to-one training programs offer flexibility, adaptation, and just in time delivery of job skills (Shermon, 2008, p.343). Key Features of One-to-One Training One-to-one training moves the site of the training from classrooms, where there is limited scope for simulation of the job environment, to the actual live environment of where the job will be performed (Shermon, 2008, p.343). The scope of one-to-one training programs is enlarged to take in the actual job requirements vis-à-vis the knowledge and skill levels...
2 Pages (500 words) Research Paper

Resp. Aircraft Operator Security Threats

... Aircraft Security Scenario one Regarding the case of airline baggage handler, he was not supposed to give the passenger his phone back directly because of security reasons. The main responsibilities of airline baggage handlers are different, but do not include any contact with passengers, because this would act as a loophole to insecurity from dishonest handlers. An airline baggage handler is supposed to be an operations agent. He makes sure that an aircraft carries the expected weight for a safe operation. He is also warehouse agent and processes inbound and outbound air freight. He also works as a ramp agent and makes sure that all loading bags are unloaded in time. It is also the role of the airline baggage handler to scan all...
2 Pages (500 words) Essay

Aircraft Performance

... School: Topic: Aircraft Performance Lecturer: I. Summary Even though jet engines existed before the World WarII in 1939, these were noted to be used only for laboratory test purposes. The post-World War II therefore served as an important era for jet engine and for that matter jet aircraft manufacturing as there were now sufficient evidence to back the commercial use of the machine (Newhouse, 1982). since 1945 when the aviation industry became transformed with new engines that produced very powerful and thrust performance, and yet coming in compact size, the commercial manufacturing of jets have never been the same (Bayerl & Berkemeier, 2011). With this said, there are both challenges and opportunities that the industry have faced since...
2 Pages (500 words) Case Study

Social Security: Is It in Danger and What Should Be Done

A country that realized the importance of giving the elderly the respect and financial stability they deserve for their lifetime efforts is the United States of America. There was a need for a system that would guarantee a monthly income for retired people. The Great Recession of 1929 left a sour taste in the minds of most American citizens and created greater instability for the nation.  On August 14, 1935, the Social Security Act was passed which created the social security system under the mandate of President Franklin D. Roosevelt (Social security). In 1962 the program was expanded to include medical insurance benefits. Social security has helped bring social justice to American retirees for over 70 years. 
6 Pages (1500 words) Term Paper

The Relationship Between Security, Risk and Health in a Large Organisation

...The relationship between Security & Risk and Health & Safety in a large organisation "Assess the relationship between Security & Risk and Health & Safety in the context of a large organisation. Are they complimentary or the demands of one conflict with or inhibit the realisation of the other? Identify and discuss the implications of your assessment for the roles of the security manager". 1. Introduction The development of commercial activities worldwide has been extremely rapid; firms operating in various industrial sectors need to confront a series of challenges in order to ensure the limitation of risk related with their strategic initiatives. Within this context, the issues of security, risk, health and safety are very likely to appear...
9 Pages (2250 words) Coursework

Active Directory - Security, User, and Resource Management

Administrators make use of group policies to launch principles for desktop predilections and software. For many corporate information technology groups, concurrence with group policies to identify what software should be presented to each category of user, even without human intervention installing it on demand from a corporate server (Silberschatz, Galvin, & Gagine 2002. P. 838). The capability of the AD was introduced in the year 1999, its initial release was with the MS Windows 2000 Server Ed., additionally personalized to spread out functionality, security parameters and build up administration in MS Win Server 2003. The most recent better facilities and efficient edition of the AD are introduced in the Windows Server 2008...
6 Pages (1500 words) Report

Information Security Management

Security is a group of activities that include the policies, measures, and actions which are utilized to stop unlawful access or alteration, theft, and physical damage to information or computer. Security can be supported by an assortment of techniques and tools to safeguard computer hardware, software communications networks, and data (Laudon & Laudon, 1999, p. 502). In the modern age of information technology, there are many threats happened for organizational information. We need a security model that has the ability to manage and secure our information reserves. Technical administrative safety /security measures like security plans, actions and techniques are the main practices for the organizational information security m...
10 Pages (2500 words) Research Paper

Information Security Policy of Organization

In the modern age of information technology, there are many threats created for organizational information. Organizations need a security model that has the capability to handle and secure our information reserves. Technical administrative safety /security measures like security plans, actions and procedures are the general practices for the organizational information security procedures. The attentiveness of producing actions is concerned by the organizations to an appreciably smaller level, on the other hand at the same time these are weighed up as being further efficient organizational actions than technical administrative ones. Information security encompasses organizational features, officially authorized aspects, institution...
6 Pages (1500 words) Research Paper

International Security Studies: Examination

Globalization affects international security in the sense that problems involving terrorism, the environment, religious extremism, weapons of mass destruction, and the economic crises have become more universal and widespread in character (Ivanov “Article”). As a result, these issues pose a greater threat to national and international stability and safety. More lives are now affected by threats to international security; these threats did not seem too ominous before the entry of globalization. Consequently, some extremists justify the use of mass weapons of destruction in order to guarantee their security. And as globalization continues to expand and to grow bigger as a phenomenon, threats to international security are...
7 Pages (1750 words) Assignment

Role of the Police and Private Security

...Report to the Legislator - Committee on Crime and Criminal Justice Congratulations on being appointed to the Committee on Crime and Criminal Justice. As a public servant you are holding a very responsible post that covers many areas of administration including the important role of providing security to the citizens of your constituency and to those individuals who visit it. This report will provide you with a clear picture on the role of security agencies with regard to homeland security. Many of the points mentioned here may be new or already known to you, but they are provided here in any case. It is common knowledge that apart from local and organized crime within the United States, the country is now facing new forms of threats like...
8 Pages (2000 words) Case Study

Enterprise Information Security and Privacy

The PCI DSS was created primarily created by Master card and Visa but later on, we're joined by three other premium credit card companies to form an independent council to counter online credit card fraud. The American Express, discover financial services and JCB were the three other companies that decided to take an active part in the stand taken by Visa and MasterCard. To understand the effectiveness of PCI DSS it becomes crucial to understand its core functionality and the reasons it was devised. The objective of PCI DSS is to build a secure network, protect cardholder data, maintain a vulnerability management program and implement strong access control measures (Wright .2008.Page11). In today’s time when security has bec...
6 Pages (1500 words) Assignment

Greatest Long Term Threat to the UKs National Security

The UK is one of the major countries which are targeted by terrorists. Apart from terrorism, the UK is currently facing many other threats. According to a written ministerial statement by the Prime Minister of UK on the National Security Strategy Progress Report submitted to Parliament on 22 March, the nature of the threats UK face currently are from piracy and cybercrime to terrorism and nuclear proliferation (Statement on National Security Strategy, 2010, p.1). This paper briefly analyses the various types of security threats the UK is facing at present.

The UK is facing both internal and external threats from terrorist groups. If Al-Qaida is the major external threat for UK’s securities, various Irish republica...
6 Pages (1500 words) Coursework

Computer System Security of the Plantain Building Company

The Information system comprises hardware and software which adds functionality to the system according to the business requirements. Human beings are required to only trigger the systems in order to contribute to business functions. (Paul, 2010)

Is it vital for Small medium enterprises to perform knowledge management tasks? Knowledge is been renowned as an economical contrivance for the organization's endurance. Small-medium enterprises often face knowledge management failures resulting in business loss. (Chan, Ivy, and Chao Chee-Kwong, 2008). The impact of the effective use of Information systems is essential for business professionals, managers are other knowledge workers. The information systems facilitate the busin...
7 Pages (1750 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Research Paper on topic Interventions in Curbing Aircraft Security for FREE!

Contact Us