Management Research Paper On Accessing Container Security (Research Paper Sample)
The requirements of this paper include a cover sheet (using the 6 line undergraduate entry), 3-5 numbered pages of text, and a reference page. The research paper requires at least five references.
Accessing Container Security
Each year Millions of shipping containers arrive at American seaports each year. This does not include the millions of containers that cross International boards by truck and rail. With every crossing container there is a threat of drug trafficking and terrorism. Customs and Border Protection executed the Importer Security Filing and Additional Carrier Requirements to gather supplemental informative data for focusing on. I'm interested in how the information gathered and used for container security. How does cargo flow securely through US boarders?
The entry of contrabands into the country is a very serious issue that contributes negatively to the economy and pose direct threat to the lives of the citizens. Roughly 840 undocumented immigrants from Mexico are caught or stopped every day along the border (Kulish and Santos, 2017). More than a million kilos of illegal drugs being transported into the country were also caught as of December 2009 (U.S. Dept. of Justice, 2010). According to an April 3, 2017 report by the ABC News, 23 illegal immigrants from China were found huddling in a cargo container at Long Beach, California. The menace brought by drug and human trafficking, smuggling of goods and entry of items used in terroristic activities is very alarming. The threats at the U.S. borders are a very challenging tasks for the authorities designated to carry out the laws.
While the government is much focused on the land border crossing of goods and the arrival of the same via air transport, shipments into the country of goods through marine vessels are also given critical attention. On January 26, 2009, the U.S. government started enforcing the Import Security Filing (ISF), commonly known as “10+2” for cargo imports arriving in the United States by vessel. It must be submitted electronically to the U.S. Customs and Border Protection (CBP) at least 24 hours before lading. The programs gives the CBP the ability to identify high-risk shipments and helps in preventing smuggling while ensuring cargo safety and security (CBP, 2009).
With this, increased inspections resulting in cargo delays became common. But it was to the effect that the country and its citizens are placed on safer grounds. The ISF is enforced by the US Customs and Border Protection and is required for all containerized shipment to the country.
The ISF is dubbed as “10+2” because of the 10 required data elements relative to the cargo plus the 2 required data elements from the carrier.
The 10 required data elements are (DHS, 2008):
3.Importer of Record Number
6.Ship to party
7.Country of origin
8.Commodity Harmonized Tariff Schedule (HTS) number
9.Container stuffing location
Additional two elements from the carrier are (DHS,
- Assignment 1: Ethical Issues in Information SystemsDescription: Identify at least three (3) problems related to management information systems that may arise from the issue that you have chosen. ...2 pages/≈550 words| 3 Sources | APA | Management | Research Paper |
- Supply Chain Management Assignment: A Case Study of SABICDescription: Some of the considerations in creating an effective supply chain for a Middle Eastern company. What challenges might the company face in terms of complexity?...6 pages/≈1650 words| 5 Sources | APA | Management | Research Paper |
- Information Management System Research Assignment PaperDescription: What problems do the previous information systems solve? What is the impact of using the previous information systems on the organization?...3 pages/≈825 words| 4 Sources | APA | Management | Research Paper |