Question

In: Operations Management

In this discussion, you will select one of TSA’s 20 layers of security or one of...

In this discussion, you will select one of TSA’s 20 layers of security or one of the layers of security for General Aviation. In your opinion, how effective is it? Give one example of how this layer of security would work successfully. Give one example of how this layer of security would not work.

DO NOT COPY FROM SOMEWHERE! TELL ME ONW YOUR WORD.

Solutions

Expert Solution

TSA's 20 layers of security was created to avoid instances like 9/11 within USA and abroad. The main aim of TSA is to provide safe travel to travellers in USA ans abroad. There are 20 layers a passenger has to pass through knowingly or unknowingly. Many of the layers are present but a normal passenger cannot make that out.

I have chosen one layer of the 20 layers being " behaviour detection officers". In my opinion this is not a layer which is an effective one. It can have many loop holes. TSA's own files say that this method / concept of security is under questioning for its dependability. There are around 3000 detection officers deployed which has costed more than $ 1.5 billion to tax payers.

If officers are well trained and deployed at stratergic locations within the airport ( in uniform or civil dress), they could possibly get hold of people with intent of mischief. Provided, this does not cause unnecessary inconvinience to other passengers who are in hurry and may get upset if they are troubled due to lack of knowledge/ training of behavioural detection program of the officers.

This layer of security may not work if the passenger ( terrorist) is well trained and knows how not to behave in public. Terrorist are trained to have a control on their expressions and behaviour. If they ( mischievious persons) are well trained then this layer of security does not work.


Related Solutions

For this discussion you will select one of the common sayings or old wives tales from...
For this discussion you will select one of the common sayings or old wives tales from the list below. You will use this to design an experiment to determine it’s validity. For your initial response, include your choice from below and tell us how you would plan your experiment answering the following questions: What population are you planning to examine? -How will you select a representative sample? -How will you randomize your subjects to the various treatments? Is it even...
Describe with examples, the various layers of security that are critical to your security plan policy.
Describe with examples, the various layers of security that are critical to your security plan policy.
For the discussion in module 3, respond to the following discussion prompt: Select one industry of...
For the discussion in module 3, respond to the following discussion prompt: Select one industry of your choice and discuss the economies and diseconomies of scale in this industry In order to answer this, you can take the help of the internet, or any other source you wish. Instructions: In order to post in this forum, click on the forum, and create a thread to type in your response. You will not be able to view other's posts until you...
SELECT only one, of the two following positions, for this discussion board. 1. You advocate for...
SELECT only one, of the two following positions, for this discussion board. 1. You advocate for economies of scale, at the state level, to streamline standard operating procedures for terrorism incidents. It is better to have a uniform system to respond to terrorism incidents so there is seamless interaction instead of chaos among agencies. There will no longer be ‘local’ police, per se; rather, there will one police force for the entire state. 2. You advocate against economies of scale,...
Discussion Database Security and UML Often, systems have only one level of security when it comes...
Discussion Database Security and UML Often, systems have only one level of security when it comes to databases. Imagine that someone is trying to add a name (which should be composed only of letters) to a database. The user mistakenly hits a number, and the system rejects the entry. Such security can be implemented at the database management system (DBMS) or the application level. Where would you apply security? Justify your choice. What are some alternative practices or standards of...
For this discussion, select one agent of socialization and describe a specific norm that one might...
For this discussion, select one agent of socialization and describe a specific norm that one might learn from that source. Be sure to describe the process of how the norm you chose is learned and internalized. Then, discuss how the norm might influence a particular social role. In response to your peers, discuss whether or not you agree with your peers’ assessment of how the norm influences the social role, or build on their posts to describe an additional social...
1). Which of the following is not included in a security agreement? Select one: a. Reference...
1). Which of the following is not included in a security agreement? Select one: a. Reference to the finance statement. b. Reference to the loan. c. Creation of the security interest. d. Description of the collateral. 2) A secured creditor's interest in after-acquired property might include Select one: a. new inventory to replace sold inventory. b. equipment purchased after the initial loan is disbursed, but paid for with money from that loan. c. Both constitute after-acquired property. d. Neither, a...
The tool in AutoCAD that allows you to adjust the properties of layers in one drawing...
The tool in AutoCAD that allows you to adjust the properties of layers in one drawing so that they match the properties of another drawing is the A. Layer Transform. B. Properties Transform. C. Layer Translator. D. Property Match.
6.Which of the following statements holds true for the concept of “security”? Select one: a. It...
6.Which of the following statements holds true for the concept of “security”? Select one: a. It refers to the degree to which a job guarantees continuity and stability of employment. b. It refers to defining the zones of one’s life and evaluating each separately in terms of work priorities, aspirations, and values. c. It refers to the time separated from work life and its concerns. d. It refers to the physical and emotional ease of a job. e. It refers...
1. Followers of the random walk hypothesis believe that Select one: a. security analysis is the...
1. Followers of the random walk hypothesis believe that Select one: a. security analysis is the best tool to utilize when investing in the stock market. b. the price movements of stocks are unpredictable, and therefore security analysis will not help to predict future market behavior. c. support levels and resistance lines, when combined with basic chart formations, yield both buy and sell signals. d. that traders can earn higher than normal returns by exploiting market anomalies such as the...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT