GPS Technology: How It Works and Who Uses It?

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!

The Global Positioning System (GPS) is a technical marvel, which uses satellites positioned such that they transmit appropriate signals that allow the GPS receivers to make calculations and display the speed, location, and the time information to the users (Zahradnik, not dated). GPS is mostly used for tracking objects moving on land, air or through water transport. Through calculations, it becomes very easy to locate where a certain cargo is from the GPS receivers.

This is made possible by capturing the signals sent. Through other technological combinations like software, the GPS receivers can display adequate information in a useful display format. This technology was originally used by the United States Department of Defense. However, it is now used in various areas. According to Collins et al. (2006), the future of the port security can only be promised through the adoption of the modern technology. The importance of this technology has increased and it his now used in various ways.

GPS can be used in various places. It is mainly used in aviation, water transportation as well as tracing trucks carrying cargo on the land. For this technology to be effective, it is advisable for all the stakeholders involved to cooperate effectively in order to promote its efficiency. Each stakeholder has to play their roles to help in achieving the best in the process. Otherwise, the results will be impotent. There are several stakeholders involved in cargo security. One of the main stakeholders involved in the cargo security is the Customs and Border Protection (CBP). This agency is involved in securing the nations borders as well as protecting the members of the American public from any threat which may negatively impact on their lives (Ritter, Barett r& Wilson, 2007). Through GPS technology, this body can be able to estimate when they expect a certain cargo to arrive (Rose India, 2008).

Another stakeholder involved in the cargo security is the carrier. The carrier has the responsibility of presenting the necessary information about the cargo to make an appropriate tracking of the cargo while in transportation. For instance, the Carriers information about the cargo should not differ from the information read through the signals sent via GPS. This information is also very important while inspecting this cargo in strategic positions. It will also be useful in preventing the incorporation of unwanted material with the cargo.

Spoofing

Spoofing can be viewed as a situation where a certain program masquerades another to gain certain advantages. In some cases, GPS spoofing takes place. For instance, the receivers may be fed with false information. When this happens, the effectiveness of this application fails. However, there are several countermeasures through which this can be solved. According to Warner and Johnston (2003), the problem of spoofing can be solved by upgrading the GPS systems frequently. It may also be reduced through authentication to the GPS signals.

Ritters TSM

The Total Security Management can be viewed as that business practice which involves the development and execution of appropriate measures aimed at maximizing the security level by reducing risks in the general supply chain. This involves preparation in the supply chain; distribution and suppliers, and preparation for disasters and other risks like terrorism. To overcome such dangers effectively, every organization must have clearly defined procedures of tackling and preventing these risks. The TSM model provides a clear framework of identifying, implementing as well as rewarding the most effective security practice (Ritter, Barrett & Wilson, 2007).

The TSM model has played a significant role in business planning. The process contributes to ensuring that the risks associated with business operations are reduced. In the process, it becomes easier to retain a high level of performance in various business activities. In the contemporary business world, the generation of new technologies has led to a significant reduction of the costs incurred in maintaining the value chain security. The total security management plays an important role in the global transportation. In other words, this model identifies three main steps; measurement of risks, Selection of alternatives available for risk mitigation.

Despite of these advantages associated with the TSM, the practices have certain shortcomings. These weaknesses form the basis for its critics. For instance, the execution of these processes requires some investment. Therefore, this leads to an increase in operational costs. As the level of technology advances, organizations are required to incorporate new strategies in their TSM. The adoption of such technologies may be very expensive.

The TSM strategy involves the integration of decision making from the vendor and third-party providers, offshore sourcing and warehouse decisions (Partridge 2011). Therefore, in case one player fails, the whole process will be ineffective.

Reference List

Collins, S. et al. (2006). Future of Port Security. U.S.A.: DIANE.

Partridge, A. (2011). Global Transportation Providers. Web.

Ritter, L. Barrett, M. and Wilson, R. (2007). Securing global transportation networks: a total security management approach. New York: McGraw-Hill.

Rose India. (2008). GPS Tracking and its Applications. Web.

Warner, J. and Johnston, R. (2003). GPS Spoofing Countermeasures. Web.

Zahradnik, F. (n.d). How GPS Works. Web.

Do you need this or any other assignment done for you from scratch?
We have qualified writers to help you.
We assure you a quality paper that is 100% free from plagiarism and AI.
You can choose either format of your choice ( Apa, Mla, Havard, Chicago, or any other)

NB: We do not resell your papers. Upon ordering, we do an original paper exclusively for you.

NB: All your data is kept safe from the public.

Click Here To Order Now!