176 research outputs found

    Supervision system for Chinese port safety and proposals for its improvement

    Get PDF

    IMPLEMENTATION OF RFID TO IMPROVE ACCOUNTABILITY IN DISTRIBUTED MARITIME OPERATIONS AND EABO

    Get PDF
    This study examines the possibility of implementing radio frequency identification (RFID) technology to improve inventory control within the Marine Corps' Expeditionary Advanced Base Operations (EABO) construct. The lack of inventory control in austere environments and isolated operations reduces the Marine Corps' ability to train, man, and equip the operating forces. The study focuses on the technology's applicability to maritime operations, resource management, and implementation within EABO. The costs and benefits of using RFID in amphibious operations and the littorals will be analyzed with special attention given to accountability and electromagnetic (EM) signature. By-hand accountability is labor- and time-intensive. Implementing RFID technology can reduce man-hours spent tracking equipment and save hundreds of hours on asset visibility. The study shows that implementing RFID technology in the Marine Corps' EABO construct can improve resource management, reduce manpower hours, and save costs due to the ease of understanding and implementation of this technology. This study demonstrates that projected improvements from RFID technology in the DOD may be overly conservative and that decision-makers should consider the actual outcomes from previous case studies when assessing the potential benefits of implementing RFID technology.Approved for public release. Distribution is unlimited.Captain, United States Marine CorpsCaptain, United States Marine Corp

    The effectiveness and economic impact of enhancing container security

    Get PDF
    Thesis (S.M.)--Massachusetts Institute of Technology, Dept. of Ocean Engineering, 2004.Includes bibliographical references (p. 96-101).Over the past few decades, international containerized shipping has evolved to become the main artery of global trade, providing both convenient and inexpensive access to goods from markets around the world. Yet the very size and efficiencies that have made container shipping such an attractive means of transport have also created a system that is highly vulnerable to terrorist exploitation. This paper outlines the current initiatives taken by both the public and private sector to address the security vulnerabilities in the container industry. The solution targets three main areas for, security: documentation/information, physical security, and inspections. The technology utilized to improve the physical security of the container can also be used to track shipments and secure the container from pilferage. This generates a win-win relationship between enhancing container security while improving supply chain information and control. An economic model is used to demonstrate the cost savings and cost avoidance from the information and control provided by security technologies. The savings to shippers more than offsets the cost of implementing these technologies. This is a valuable approach to solving the problem of container security because it concurrently provides incentive to the private sector and protects global interests.by Eric L. Dresser.S.M

    An investigation into the illegal movement of goods from seaports-of-entry : a case study at Durban harbour

    Get PDF
    Seaports, or harbours, play a vital role in the logistical supply chain, since they handle the largest volumes of containerised cargo and bulk goods that enter any country. Over the decades, globalisation and free trade have resulted in increased movement of cargo and people through the sea ports. The security functions in all categories of the ports are of paramount importance, seeing that border posts or ports are the main entry and exit points of any country. The marine transport system is responsible for 95-98 per cent of South Africaโ€™s imports and exports. South Africaโ€™s maritime sector, and in particular its eight commercial ports-of-entry, play a major role in the South African economy, as well as those of South Africaโ€™s neighbouring landlocked countries. As a result of the volume of cargo containers passing through these ports, it is often challenging to detect or even examine all of the cargo that enters or leaves the port. A 2007 report titled โ€˜The collective approach to Border Controlโ€™ states that the movement of illegal goods crossing South African borders is in the amount of 20 billion Rand per year. The illegal movement of goods represents an enormous loss to South Africa in terms of revenue, as well as customs and excise duties, and negatively impacts on the confidence of our international investors. One of South Africaโ€™s busiest seaports-of-entry is the Durban harbour. This study sought to investigate the challenges presented by the illegal movement of goods through Durban harbour. The research sought to establish how the goods were being moved illegally through the Durban harbour area. The focus is on the security risk control measures that should control the illegal movement of goods from the Durban Harbour. The objectives of this study were: to examine the existing security risk control measures at the Durban harbour; to assess the risks associated with the illegal movement of goods at the Durban harbour; and to identify the security risk control measures required to prevent the illegal movement of goods at the Durban harbour. The study made use of the qualitative research approach to research the unlawful transfer of goods entering through seaports. Three methods of data collection were used. These were a documentary study of police case dockets, an onsite security audit of the Durban harbour, and face-to-face interviews between the researcher and the interviewees in accordance with an interview schedule. Semi-structured interviews were conducted with the SAPS Border Police, customs officials and security officials who were stationed at the Durban harbour. Thirty (30) sample respondents were individually interviewed by the interviewer. An analysis of fifty (50) police dockets which were registered on the SAPS crime administration system for โ€˜Theft and Contraband Smugglingโ€™ were also analysed, where the scene-of-crime was the Durban harbour. In addition, an onsite evaluation of the current security measures at the Durban harbour was conducted. All of the data collected was analysed using a data-spiral method, which generated themes and categories. The findings established that there are shortcomings or gaps within the existing security measures for the prevention of, and safeguarding the harbour as a port against, criminal risks or security weaknesses. Accordingly, the researcher has recommended certain measures that should assist in eliminating or reducing the associated criminal risks affecting the harbour.Criminology and Security ScienceM. Tech. (Security Management

    Seaport Vulnerability to Criminal Networks: A Mixed Method Approach to Measuring Criminological Vulnerability in the Top 30 U.S. Container Ports

    Full text link
    Seaports form a unique space for criminological examination. As the locus points for the majority of international and domestic trade criminal network access to a port can provide outsized benefits. While ports are physical spaces they are underlined by complex systems incorporating public and private agencies, companies and small entities. Underlying the administrative and logistical activity at the port is a jurisdictional web of public and private security regulatory agencies. The complexity of the environment creates vulnerabilities that criminal networks can use to gain access to ports. This dissertation developed a Seaport Vulnerability Framework (SVF), developed from the rational choice and situational crime prevention literature with a multi-disciplinary focus that allows security stakeholders to identify whether a port is at risk of utilization by criminal networks. The SVF is used to measure and analyze criminological vulnerability in the top 30 U.S. container seaports and in-depth in a case study at the Port of New York and New Jersey. Finally, I examine the implications of the SVF for port and maritime security policy and port security assessments in the U.S. and worldwide

    Focusing on the case analysis of advanced smart ports

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ํ–‰์ •๋Œ€ํ•™์› ๊ธ€๋กœ๋ฒŒํ–‰์ •์ „๊ณต, 2023. 2. Lee, Soo-young.๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์ตœ๊ทผ ๊ฐ๊ด‘๋ฐ›๊ณ  ์žˆ๋Š” ์Šค๋งˆํŠธ ํ•ญ๋งŒ์˜ ๊ฐœ๋…๊ณผ ํ•ญ๋งŒ ๊ฒฝ์Ÿ๋ ฅ๊ณผ์˜ ๊ด€๊ณ„๋ฅผ ๊ณ ์ฐฐํ•ด ๋ณด๊ณ , ์„ ์ง„ ์Šค๋งˆํŠธ ํ•ญ๋งŒ์— ๋Œ€ํ•œ ๋‹ค๊ฐ์ ์ธ ๋ถ„์„์„ ํ†ตํ•ด ์šฐ๋ฆฌ๋‚˜๋ผ ์Šค๋งˆํŠธ ํ•ญ๋งŒ ๋ฐœ์ „ ๋ฐฉํ–ฅ์— ๋Œ€ํ•œ ์‹œ์‚ฌ์ ์„ ๋„์ถœํ•˜๊ณ ์ž ํ•˜์˜€๋‹ค. ์ด๋ฅผ ์œ„ํ•ด A. Molavi ์™ธ์˜ ์—ฐ๊ตฌ์—์„œ ํ™•๋ฆฝ๋œ ์Šค๋งˆํŠธ ํ•ญ๋งŒ ํ‰๊ฐ€ ์ฒ™๋„์˜ 4๊ฐ€์ง€ ์ธก๋ฉด, ์šด์˜์ธก๋ฉด(Operation), ํ™˜๊ฒฝ์ธก๋ฉด(Environment), ์—๋„ˆ์ง€ ์ธก๋ฉด(Energy), ๊ทธ๋ฆฌ๊ณ  ์•ˆ์ „๊ณผ ๋ณด์•ˆ ์ธก๋ฉด(Safety & Security)์˜ ๋ถ„์„ํ‹€์„ ํ™œ์šฉํ•˜์—ฌ ์Šค๋งˆํŠธ ํ•ญ๋งŒ ๊ฐœ๋ฐœ๊ณผ ๋ฐœ์ „์— ๊ฐ€์žฅ ์•ž์„  ๋„ค๋œ๋ž€๋“œ์˜ ๋กœํ…Œ๋ฅด๋‹ด ํ•ญ๋งŒ๊ณผ ๋…์ผ์˜ ํ•จ๋ถ€๋ฅดํฌ ํ•ญ๋งŒ์˜ ์ •์ฑ… ๋ถ„์„์„ ์‹œ๋„ํ•˜์˜€๋‹ค. A. Molavi ์™ธ์˜ ์—ฐ๊ตฌ๋Š” ์ธก์ • ๊ฐ€๋Šฅํ•œ ์Šค๋งˆํŠธํ™” ์ง€์ˆ˜๋ฅผ ๋ฐœ์ „์‹œ์ผœ ๊ฐ ํ•ญ๋งŒ์˜ ์Šค๋งˆํŠธํ™” ์ •๋„๋ฅผ ๊ฐ€๋Š ํ•˜๊ณ  ์žฅ๋‹จ์ ์„ ํŒŒ์•…ํ•  ์ˆ˜ ์žˆ๊ฒŒ ํ•˜๊ธฐ ์œ„ํ•œ ์ทจ์ง€์—์„œ ๊ฐœ๋ฐœ๋˜์—ˆ๋‹ค. ํ•˜์ง€๋งŒ ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์Šค๋งˆํŠธ ํ•ญ๋งŒ์˜ ํ‰๊ฐ€ ์ฒ™๋„๋ฅผ ํ™œ์šฉํ•˜๋˜ ์งˆ์ ์ธ ๋ถ„์„์œผ๋กœ ์ ‘๊ทผํ•˜์—ฌ ์ •์ฑ… ํ™œ์šฉ ์ธก๋ฉด์—์„œ ์œ ์šฉํ•œ ์‹œ์‚ฌ์ ์„ ๋„์ถœํ•˜๋Š”๋ฐ ๋ชฉ์ ์„ ๋‘์—ˆ๋‹ค. ๋˜ํ•œ ๋™์ผํ•œ ํ‹€์„ ํ™œ์šฉํ•˜์—ฌ ํ˜„์žฌ ๋ถ€์‚ฐ ์ปจํ…Œ์ด๋„ˆ ํ„ฐ๋ฏธ๋„์˜ ์Šค๋งˆํŠธ ํ•ญ๋งŒ ๋ฐœ์ „ ๊ณ„ํš์„ ๋ถ„์„ํ•˜๊ณ  ๋ฐœ์ „๋ฐฉํ–ฅ ์„ค์ •์— ๋„์›€์„ ์ฃผ๊ณ ์ž ํ•˜์˜€๋‹ค. ์šฐ์„  ์šด์˜ ์ธก๋ฉด์—์„œ ์„ ์ง„ ์Šค๋งˆํŠธ ํ•ญ๋งŒ๋“ค์€ ํ•ญ๋งŒ ๋‚ด ํ•˜์—ญ ์ „ ๊ณผ์ •์˜ ์™„์ „ ์ž๋™ํ™”๋ฅผ ๋‹ฌ์„ฑํ•˜์˜€๊ณ , ์ด์— ๊ทธ์น˜์ง€ ์•Š๊ณ  ํ•ญ๋งŒ ๋‚ด ๋ชจ๋“  ๊ณผ์ •์„ 4์ฐจ ์‚ฐ์—…ํ˜๋ช…์˜ ์ฒจ๋‹จ ๊ธฐ์ˆ ๋“ค์„ ํ™œ์šฉํ•˜์—ฌ ๋ฌด์ธํ™”์™€ ํšจ์œจํ™”๋ฅผ ์ถ”๊ตฌํ•˜์˜€๋‹ค. ์ด ๊ณผ์ •์—์„œ A.I, IoT, ๋ธ”๋ก์ฒด์ธ ๋“ฑ 4์ฐจ ์‚ฐ์—…ํ˜๋ช…์˜ ํ•ต์‹ฌ ๊ธฐ์ˆ ๋“ค์„ ์ ๊ทน ํ™œ์šฉํ•˜์—ฌ ํ•ญ๋งŒ์˜ ์ „์ฒด์ ์ธ ๋ชจ์Šต์„ ๋ณ€ํ™”์‹œ์ผœ ๊ฐ€๊ณ  ์žˆ์œผ๋ฉฐ, ๋น„์šฉ์ ˆ๊ฐ๊ณผ ์ƒ์‚ฐ์„ฑ ์ฆ๋Œ€ ๋“ฑ ์ง์ ‘์ ์ธ ํšจ๊ณผ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ ๊ธ€๋กœ๋ฒŒ ๋ฌผ๋ฅ˜์˜ ํ•ต์‹ฌ ๊ตฌ์‹ฌ์ ์œผ๋กœ์จ ์Šค๋งˆํŠธ ํ•ญ๋งŒ์˜ ๊ฐ€๋Šฅ์„ฑ์„ ๋ฐœ์ „์‹œ์ผœ ๋‚˜๊ฐ€๊ณ  ์žˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ํ•ญ๋งŒ ๊ฒฝ์Ÿ๋ ฅ ํ–ฅ์ƒ์€ ๋ฌผ๋ก  ๋ฌผ๋ฅ˜ ํฌํ„ธ๋กœ์จ์˜ ์ง€์œ„๋ฅผ ์„ ์ ํ•˜๊ธฐ ์œ„ํ•œ ๊ฒฝ์Ÿ๋„ ์‹ฌํ™”๋˜๊ณ  ์žˆ๋‹ค. ํ™˜๊ฒฝ ์ธก๋ฉด์—์„œ๋Š” ์นœํ™˜๊ฒฝ ํ•ญ๋งŒ์— ๋Œ€ํ•œ ๊ด€์‹ฌ์ด ์ฆ๋Œ€๋˜๊ณ  ์žˆ๋‹ค. ํ•ญ๋งŒ์€ ๋” ์ด์ƒ ๋„์‹œ์™€ ๋ถ„๋ฆฌ๋˜์–ด ์กด์žฌํ•˜๋Š” ๋…๋ฆฝ๋œ ์˜์—ญ์ด ์•„๋‹Œ, ์ธ์ ‘ ๋„์‹œ ์ฃผ๋ฏผ๋“ค๊ณผ ์ƒํ˜ธ ์˜ํ–ฅ์„ ์ฃผ๊ณ ๋ฐ›์œผ๋ฉฐ ๋ฐœ์ „ํ•˜๋Š” ํ˜ธํ˜œ์ ์ธ ๊ด€๊ณ„๋ฅผ ๊ตฌ์ถ•ํ•ด์•ผ ํ•œ๋‹ค๋Š”๋ฐ ๊ณต๊ฐ๋Œ€๊ฐ€ ํ˜•์„ฑ๋˜๊ณ  ์žˆ๋‹ค. ์ด๋ฅผ ์œ„ํ•ด ๊ทธ๋™์•ˆ ํ•ญ๋งŒ ํ™œ๋™์„ ํ†ตํ•ด ์•ผ๊ธฐ๋˜์—ˆ๋˜ ํ™˜๊ฒฝ ์˜ค์—ผ ๋ฌธ์ œ๋ฅผ ์ค„์ด๊ณ  ์ง€์—ญ์‚ฌํšŒ์— ๊ธฐ์—ฌํ•˜๊ธฐ ์œ„ํ•œ ๋…ธ๋ ฅ๋“ค์ด ํ™œ๋ฐœํžˆ ์ง„ํ–‰๋˜๊ณ  ์žˆ๋‹ค. ์ „๋ ฅ์— ๊ธฐ๋ฐ˜ํ•œ ์นœํ™˜๊ฒฝ ํ•˜์—ญ์žฅ๋น„๋กœ ๋Œ€์ฒดํ•˜๊ณ , ์„ ๋ฐ•์˜ ์—ฐ๋ฃŒ๋ฅผ ์นœํ™˜๊ฒฝ ์—ฐ๋ฃŒ๋กœ ์ „ํ™˜ํ•˜๋Š” ๋…ธ๋ ฅ์ด ์ง„ํ–‰ ์ค‘์ด๋‹ค. ํ•ญ๋งŒ ๋‚ด ์œ ํœด๋ถ€์ง€๋ฅผ ํ™œ์šฉํ•ด ์‹ ์žฌ์ƒ์—๋„ˆ์ง€๋ฅผ ๋ฐœ์ „ํ•˜๊ณ  ์ธ๊ทผ ์ง€์—ญ์— ๊ณต๊ธ‰ํ•˜๋Š” ๋ฐฉ์•ˆ๊ณผ, ํ•ญ๋งŒ์˜ ํ™˜๊ฒฝ ๋ฌธ์ œ๋ฅผ IoT ๊ธฐ์ˆ ์„ ํ™œ์šฉํ•˜์—ฌ ์‹ค์‹œ๊ฐ„์œผ๋กœ ๊ฐ์‹œํ•˜๊ณ  ๊ณต์œ ํ•˜๋Š” ์‹œ์Šคํ…œ์„ ๊ตฌ์ถ•ํ•˜์—ฌ ํ•ญ๋งŒ์˜ ์ง€์† ๊ฐ€๋Šฅํ•œ ๋ฐœ์ „์„ ์˜๋„ํ•˜๋ฉฐ ํƒ„์†Œ ์ค‘๋ฆฝ ์‚ฌํšŒ๋กœ์˜ ์ง„์ „์— ์ค‘์š”ํ•œ ์—ญํ• ์„ ์ž์ฒ˜ํ•˜๊ณ  ์žˆ๋‹ค. ์—๋„ˆ์ง€ ์ธก๋ฉด์—์„œ๋Š” ์Šค๋งˆํŠธ ํ•ญ๋งŒ์ด ๋ฏธ๋ž˜ ์ˆ˜์†Œ ์‚ฌํšŒ์˜ ํ•ต์‹ฌ ๊ณต๊ธ‰ ๊ธฐ์ง€๊ฐ€ ๋  ์ „๋ง์ด๋‹ค. ํ•ด์ƒ ๋ฌผ๋ฅ˜์™€ ์œก์ƒ ๋ฌผ๋ฅ˜๊ฐ€ ๊ฒฐํ•ฉ๋˜๋Š” ๊ธฐ๋Šฅ์  ์ด์ ์„ ํ™œ์šฉํ•˜์—ฌ ์ˆ˜์†Œ์˜ ์ƒ์‚ฐ๊ณผ ์ €์žฅ, ๋ถ„๋ฐฐ ๋“ฑ ์ˆ˜์†Œ ๊ฒฝ์ œ์˜ ํ•ต์‹ฌ ์ธํ”„๋ผ๋ฅผ ํ•ญ๋งŒ ๋‚ด ๊ตฌ์ถ•ํ•˜๊ณ  ํ•ญ๋งŒ ๊ธฐ๋Šฅ๊ณผ์˜ ๊ฒฐํ•ฉ์„ ์‹œ๋„ํ•˜๊ณ  ์žˆ๋‹ค. ์ด๋ฅผ ์œ„ํ•ด ์„ ์ง„ ํ•ญ๋งŒ๋“ค์€ ๋Œ€๊ทœ๋ชจ ํŒŒ์ดํ”„ ๋ผ์ธ์„ ๊ฑด์„คํ•˜๋Š” ํ”„๋กœ์ ํŠธ๋“ค์„ ์ง„ํ–‰ํ•˜๋ฉฐ ๋ฏธ๋ž˜๋ฅผ ์ค€๋น„ํ•˜๊ณ  ์žˆ๋‹ค. ์•ˆ์ „๊ณผ ๋ณด์•ˆ ์ธก๋ฉด์—์„œ๋Š” ํ•ญ๋งŒ์ด ์ฒจ๋‹จ ๊ธฐ์ˆ  ํ™œ์šฉ์˜ ๊ฒฝ์—ฐ์žฅ์ด ๋˜๊ณ  ์žˆ๋‹ค. ํ•ญ๊ณต ๋ฐ ํ•ด์ƒ, ์ˆ˜์ค‘ ๋“œ๋ก  ๋“ฑ ์ฒจ๋‹จ ์žฅ๋น„๋“ค์„ ํ™œ์šฉํ•˜์—ฌ ๋“œ๋„“์€ ํ•ญ๋งŒ์„ ๊ฐ€์ƒ ํ˜„์‹ค์„ธ๊ณ„์ธ ํŠธ์œˆ ํƒ€์›Œ์— ์ด์‹ํ•˜๊ณ  ์ธ๊ณต์ง€๋Šฅ์— ์˜ํ•œ ์‹ค์‹œ๊ฐ„ ๊ด€๋ฆฌ ๊ฐ๋…์ด ๊ฐ€๋Šฅํ•œ ์‹œ์Šคํ…œ์ด ๊ตฌ์ถ•๋˜๊ณ  ์žˆ๋‹ค. ํ•ญ๋งŒ ๋‚ด ํ•˜์—ญ์ž‘์—…์˜ ๋ฌด์ธํ™”๋Š” ์•ˆ์ „์‚ฌ๊ณ ์˜ ์œ„ํ—˜์„ ํš๊ธฐ์ ์œผ๋กœ ์ค„์ผ ์ˆ˜ ์žˆ์„ ๋ฟ๋งŒ ์•„๋‹ˆ๋ผ, ์‚ฌ๊ฐ ์ง€๋Œ€๊ฐ€ ์—†๋Š” ๊ด€๋ฆฌ ๊ฐ๋…๋„ ๊ฐ€๋Šฅํ•ด์ ธ ํ•ญ๋งŒ ๋‚ด ์žฌ๋‚œ์‚ฌ๊ณ ์™€ ๋ฐ€์ž…๊ตญ ๋“ฑ์˜ ๋ฌธ์ œ๋ฅผ ๊ทผ๋ณธ์ ์œผ๋กœ ๋ณ€ํ™”์‹œํ‚ฌ ๊ฒƒ์œผ๋กœ ๊ธฐ๋Œ€๋˜๊ณ  ์žˆ๋‹ค. ํ•˜์ง€๋งŒ ์„ ์ง„ ์Šค๋งˆํŠธ ํ•ญ๋งŒ์—์„œ ์ถ”๊ตฌํ•˜๋Š” ๊ทผ๋ณธ์ ์ธ ๋ฐฉํ–ฅ์€ ์„ธ๊ณ„ ๋ฌผ๋ฅ˜์˜ ํ•ต์‹ฌ ํฌํ„ธ์„ ๊ตฌ์ถ•ํ•˜๋Š” ๊ฒƒ์ด๋ฉฐ ์ด๋ฅผ ์œ„ํ•ด ํ•ญ๋งŒ์˜ ์—ญํ• ์€ ๊ธฐ์กด์˜ ์ง€์—ญ์ ์ธ ํ•œ๊ณ„๋ฅผ ๋„˜์–ด ๊ธฐ๋Šฅ์ ์œผ๋กœ ๊ทธ๋ฆฌ๊ณ  ๋ฌผ๋ฆฌ์ ์œผ๋กœ ํŒฝ์ฐฝํ•˜๊ณ  ์žˆ๋‹ค. ์šฐ๋ฆฌ๋‚˜๋ผ์˜ ๊ฒฝ์šฐ ์ผ์ฐ์ด ์ž๋™ํ™” ํ•ญ๋งŒ์˜ ๋ฐœ์ „์„ ์‹œ์ž‘ํ•œ ์œ ๋Ÿฝ ํ•ญ๋งŒ์€ ๋ฌผ๋ก  ์ธ๊ทผ ์ค‘๊ตญ๊ณผ ์‹ฑ๊ฐ€ํฌ๋ฅด์˜ ์ž๋™ํ™” ํ•ญ๋งŒ๊ณผ ๋น„๊ตํ•ด๋„ ๋’ค์ณ์ง€๊ณ  ์žˆ๋Š” ๊ฒƒ์ด ํ˜„์‹ค์ด๋‹ค. ์ด๋ฅผ ๋งŒํšŒํ•˜๊ธฐ ์œ„ํ•ด ์ค‘์•™ ์ •๋ถ€ ์ฐจ์›์—์„œ ์Šค๋งˆํŠธ ํ•ด์ƒ๋ฌผ๋ฅ˜์ฒด๊ณ„ ๊ตฌ์ถ• ์ „๋žต์„ ์ˆ˜๋ฆฝํ•˜๊ณ  2030๋…„ ์Šค๋งˆํŠธ ํ•ญ๋งŒ์˜ ๋ณธ๊ฒฉ์ ์ธ ์šด์˜์„ ๊ณ„ํšํ•˜๊ณ  ์žˆ๋‹ค. ํ•˜์ง€๋งŒ ๋ณธ ๊ณ„ํš์€ ์ „๋ฐ˜์ ์ธ ๋ฌผ๋ฅ˜ ๊ธฐ๋Šฅ ์ค‘ ํ•˜์œ„ ์š”์†Œ๋กœ ์Šค๋งˆํŠธ ํ•ญ๋งŒ์„ ์ธ์‹ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ์ด๋Š” ์Šค๋งˆํŠธ ํ•ญ๋งŒ์„ ์ž๋™ํ™” ํ•ญ๋งŒ์ด๋ผ๋Š” ์ข์€ ์ธก๋ฉด์—์„œ๋งŒ ๋ฐ”๋ผ๋ณด๊ณ  ์žˆ๋Š” ๊ฒƒ์œผ๋กœ, ํ•ญ๋งŒ์˜ ๋ฏธ๋ž˜ ์ž ์žฌ๋ ฅ์— ๋Œ€ํ•œ ์„ ์ง„ ํ•ญ๋งŒ๋“ค์˜ ์ธ์‹๊ณผ๋Š” ํฐ ์ฐจ์ด๊ฐ€ ์žˆ๋‹ค๊ณ  ํ•˜๊ฒ ๋‹ค. ๋˜ํ•œ ์Šค๋งˆํŠธ ํ•ญ๋งŒ์˜ ๋ฐœ์ „ ๊ณผ์ •์—์„œ ๋ฏผ๊ฐ„ ๊ธฐ์—…๊ณผ ํ•ญ๋งŒ ์ดํ•ด๊ด€๊ณ„์ž๋“ค์ด ์ ๊ทน์ ์œผ๋กœ ์ฐธ์—ฌํ•˜๊ณ  ํ˜‘๋ ฅํ•˜์—ฌ ์Šค๋งˆํŠธ ํ•ญ๋งŒ์˜ ๋ชจ์Šต์„ ๊ทธ๋ ค๊ฐ€๋Š” ์„ ์ง„ ํ•ญ๋งŒ๊ณผ๋Š” ๋‹ฌ๋ฆฌ ์šฐ๋ฆฌ๋‚˜๋ผ์˜ ๊ฒฝ์šฐ ์—ฌ์ „ํžˆ ์ •๋ถ€ ์ฃผ๋„ ๋ฐœ์ „ ๋ฐฉ์‹์„ ๊ณ ์ˆ˜ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ๊ฐ€์žฅ ์ฃผ๋„์ ์ธ ์—ญํ• ์„ ํ•ด์•ผ ํ•  ํ•ญ๋งŒ ๊ณต์‚ฌ๋“ค์˜ ์—ญํ• ์ด ๋ฏธ๋ฏธํ•œ ๊ฒƒ์€ ํ•œ๊ณ„๋ผ๊ณ  ํ•˜๊ฒ ๋‹ค. ๊ทธ๋ฆฌ๊ณ  ํ–ฅํ›„ ํƒ„์†Œ ์ค‘๋ฆฝ ์‚ฌํšŒ๋กœ์˜ ์ดํ–‰์˜๋ฌด ๋“ฑ ํ™˜๊ฒฝ์ ์ธ ๋ฌธ์ œ์™€ ์นœํ™˜๊ฒฝ ์—๋„ˆ์ง€๋กœ์˜ ์ „ํ™˜์ด ์ค‘์š”์‹œ๋˜๊ณ  ์žˆ๋Š” ์‹œ์ ์—์„œ ์ด์— ๋Œ€ํ•œ ๊ทผ๋ณธ์ ์ธ ์ „ํ™˜๊ณ„ํš์ด๋‚˜ ํ•ญ๋งŒ์˜ ์ƒˆ๋กœ์šด ์—ญํ• ์— ๋Œ€ํ•œ ๊ณ ๋ฏผ์ด ๋ถ€์กฑํ•œ ๊ฒƒ๋„ ๋น„๊ต ์—ฐ๊ตฌ๋ฅผ ํ†ตํ•ด ๋„์ถœํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค. ์œ ๋Ÿฝ์˜ ํ•ญ๋งŒ๋“ค๊ณผ๋Š” ๋‹ฌ๋ฆฌ ์ˆ˜์†Œ ๊ฒฝ์ œ๋กœ์˜ ์ดํ–‰์— ์žˆ์–ด ํ•ญ๋งŒ์˜ ํ•ต์‹ฌ์  ์—ญํ• ์ด ๋น ์ ธ ์žˆ๋‹ค๋Š” ๊ฒƒ์€ ์Šค๋งˆํŠธ ํ•ญ๋งŒ์— ๋Œ€ํ•œ ์ธ์‹ ๋ถ€์กฑ์—์„œ ๋น„๋กฏ๋œ ๊ฒƒ์œผ๋กœ ๋ณด์ด๋ฉฐ ์ด์— ๋Œ€ํ•œ ์ •์ฑ…์  ๊ฐœ์„ ์ด ํ•„์š”ํ•œ ๊ฒƒ์œผ๋กœ ๋ณด์ธ๋‹ค.This study examines the relationship between the concept of smart ports and port competitiveness, which have recently been in the spotlight, and attempts to derive implications for Korea's smart port development direction through various analysis of advanced smart ports. To this end, this research attempted to analyze the policies of Rotterdam Port in the Netherlands and Hamburg Port in Germany, which are most advanced in smart port development and development, using the analysis framework of four smart port evaluation measures established in A. Molavi et al. In terms of operation, advanced smart ports achieved complete automation of the entire loading and unloading process in the port, and not only this, but all processes in the port were pursued for unmanned and efficient use of the advanced technologies of the 4th Industrial Revolution. In terms of the environment, interest in eco-friendly ports is increasing. There is a consensus that ports should no longer be independent areas that exist separately from cities, but should establish reciprocal relationships that interact and develop with residents of neighboring cities. In terms of energy, smart ports are expected to become a key supply base for the future hydrogen society. Taking advantage of the functional advantages of combining marine logistics and land logistics, the core infrastructure of the hydrogen economy, such as hydrogen production, storage, and distribution, is built in ports and attempted to combine them with port functions. In terms of safety and security, ports are becoming a competition for the use of advanced technology. Using high-tech equipment such as aviation, sea, and underwater drones, a system that allows real-time management and supervision by artificial intelligence is being established by transplanting a wide port into a virtual reality twin tower. In the case of Korea, the reality is that it is lagging behind not only European ports that started the development of automated ports early but also automated ports in neighboring China and Singapore. To make up for this, the central government has established a "smart maritime logistics system construction strategy" and plans to operate smart ports in earnest in 2030. However, this plan recognizes smart ports as a sub-factor of the overall logistics function, which only looks at smart ports in the narrow aspect of automated ports, which is very different from advanced ports' perceptions of the future potential of ports. In addition, unlike advanced ports in which private companies and port stakeholders actively participate and cooperate in the development of smart ports, Korea still adheres to the government-led development method, and the role of port authorities to play the most leading role is insignificant. In addition, at a time when environmental problems such as the obligation to transition to a carbon-neutral society in the future and the transition to eco-friendly energy are becoming important, this comparative study was able to derive the lack of concern about the fundamental transition plan or the new role of ports. Unlike ports in Europe, the absence of a key role in the transition to a hydrogen economy seems to stem from a lack of awareness of smart ports, and policy improvements are needed.Chapter 1. Introduction ๏ผ‘ 1.1. Study Background ๏ผ‘ 1.2. Scope and Method of Study ๏ผ’ Chapter 2. Theoretical Discussions and Prior Study Reviews ๏ผ” 2.1. Theoretical discussion of smart ports ๏ผ” 2.1.1. Significance of Ports ๏ผ” 2.1.2. Development of Ports ๏ผ• 2.1.3. Prior Study of Smart Ports ๏ผ– 2.1.4. Smart Port Index (SPI) ๏ผ™ 2.2. Theoretical discussion of port competitiveness ๏ผ‘๏ผ‘ 2.2.1 The Concept of Port Competitiveness ๏ผ‘๏ผ‘ 2.2.2. A Prior Study on Port Competitiveness ๏ผ‘๏ผ“ 2.2.3. Port Competitiveness and Performance Evaluation ๏ผ‘๏ผ• 2.3. The relationship between smart ports and port competitiveness ๏ผ‘๏ผ— 2.3.1. Smart Port Components and Port Competitiveness ๏ผ‘๏ผ— 2.3.2. Trends in Smart Port Development ๏ผ’๏ผ“ 2.4. Results of previous study review ๏ผ’๏ผ— 3.1. Analysis Targets and Data ๏ผ’๏ผ˜ 3.2. Analytical Model ๏ผ’๏ผ™ Chapter 3. Case Analysis ๏ผ“๏ผ’ 3.1. Port of Rotterdam (Netherlands) ๏ผ“๏ผ’ 3.1.1. Background and Status of Smart Port Introduction ๏ผ“๏ผ’ 3.1.2. Operational Aspects of Smart Port ๏ผ“๏ผ” 3.1.3. Environmental Aspects of Smart Port ๏ผ“๏ผ— 3.1.4. Energy Aspects of Smart Port ๏ผ“๏ผ™ 3.1.5. Safety and Security Aspects of Smart Port ๏ผ”๏ผ‘ 3.1.6. Implications ๏ผ”๏ผ“ 3.2. Port of Hamburg (Germany) ๏ผ”๏ผ• 3.2.1. Background and Status of Smart Port Introduction ๏ผ”๏ผ• 3.2.2. Operational Aspects of Smart Port ๏ผ”๏ผ˜ 3.2.3. Environmental Aspects of Smart Port ๏ผ•๏ผ‘ 3.2.4. Energy Aspects of Smart Port ๏ผ•๏ผ“ 3.2.5. Safety and Security Aspects of Smart Port ๏ผ•๏ผ• 3.2.5. Implications ๏ผ•๏ผ– 3.3. Port of Busan (S.Korea) ๏ผ•๏ผ˜ 3.3.1. Background and Status of Smart Port Introduction ๏ผ•๏ผ˜ 3.3.2. Operational Aspects of Smart Port ๏ผ–๏ผ 3.3.3. Environmental Aspects of Smart Port ๏ผ–๏ผ’ 3.3.4. Energy Aspects of Smart Port ๏ผ–๏ผ“ 3.3.5. Safety and Security Aspects of Smart Port ๏ผ–๏ผ” Chapter 4. Conclusion ๏ผ–๏ผ– 4.1. Results of Research ๏ผ–๏ผ– 4.2. Policy Implications ๏ผ—๏ผ 4.3. Limitations of Research ๏ผ—๏ผ” Bibliography ๏ผ—๏ผ– Abstract in Korean ๏ผ˜๏ผ’์„

    Maritime Transport โ€˜16

    Get PDF

    International logistics

    Get PDF

    Public Policy and Technology: Advancing Civilization at the Expense of Individual Privacy

    Get PDF
    Technological advances have created a new existence, providing an unforeseen level of interaction and transaction between parties that have never physically met. Preliminary thinking was that these advances would create a previously unimaginable level of privacy and anonymity. While a surface examination suggests an abundance of privacy in modern society, a more thorough examination reveals different results. Advances in technology and changes in public policy have produced a world in which a startling amount of information is available regarding a given individual. Rather than experiencing an increase in individual privacy, modern societies suffer from rapidly decreasing individual privacy

    Workplace values in the Japanese public sector: a constraining factor in the drive for continuous improvement

    Get PDF
    • โ€ฆ
    corecore