
- English
- ePUB (mobile friendly)
- Available on iOS & Android
About this book
The surface transportation system is vital to our nation's economy, defense, and quality of life. Because threats against the system have hitherto been perceived as minor, little attention has been paid to its security. But the world is changing, as highlighted by dramatic incidents such as the terrorist chemical attack on the Tokyo subway in 1995. As a consequence, security concerns are now attracting more attention--appropriately so, for the threat is real, and responding to it is hard. Although the surface transportation system is remarkably resilient, it is also open and decentralized, making a security response challenging. Research and development can contribute to that response in important ways.Some important themes emerge from analysis of this strategy. First, a dual-use approach, in which security objectives are furthered at the same time as other transportation goals, can encourage the implementation of security technologies and processes. Second, modeling could be used more to develop a better understanding of the scope of the security problem. Third, DOT can play an important role in developing and disseminating information about best practices that use existing technologies and processes, including low-technology alternatives. Finally, security should be considered as part of a broader picture, not a wholly new and different problem but one that is similar and closely connected to the transportation community's previous experience in responding to accidents, natural disasters, and hazardous materials.
Tools to learn more effectively

Saving Books

Keyword Search

Annotating Text

Listen to it instead
Information
Table of contents
- COVER PAGE
- COMMITTEE ON R&D STRATEGIES TO IMPROVE SURFACE TRANSPORTATION SECURITY
- NATIONAL MATERIALS ADVISORY BOARD
- COMPUTER SCIENCE AND TELECOMMUNICATIONS BOARD
- TRANSPORTATION RESEARCH BOARD EXECUTIVE COMMITTEE
- Preface
- Acknowledgments
- Contents
- Boxes, Figures, and Tables
- Executive Summary
- 1 Introduction and Background
- 2 Assessing Vulnerability
- 3 Establishing a Research and Development Strategy
- 4 Applying the Methodology: Some Specific Research and Development Topics
- 5 A Vision of the Future
- References
- Appendices
- Biographical Sketches of Committee Members
Frequently asked questions
- Essential is ideal for learners and professionals who enjoy exploring a wide range of subjects. Access the Essential Library with 800,000+ trusted titles and best-sellers across business, personal growth, and the humanities. Includes unlimited reading time and Standard Read Aloud voice.
- Complete: Perfect for advanced learners and researchers needing full, unrestricted access. Unlock 1.4M+ books across hundreds of subjects, including academic and specialized titles. The Complete Plan also includes advanced features like Premium Read Aloud and Research Assistant.
Please note we cannot support devices running on iOS 13 and Android 7 or earlier. Learn more about using the app