aviation security
Recently Published Documents


TOTAL DOCUMENTS

355
(FIVE YEARS 70)

H-INDEX

17
(FIVE YEARS 1)

2021 ◽  
Vol 2 (2) ◽  
pp. 192-191
Author(s):  
Edna Nyatichi Omweno

Terrorist acts against the civil aviation industry have remained sustained since the first recorded aircraft hijack in February 1931. The devastating effects of a successful terror attack in the aviation industry transcend the jurisdictions of many states, threatening their national and human security. This study sought to analyse the responses to combat terrorism within the aviation industry in Kenya. It employed the exploratory research design. This design is appropriate for a research problem in cases where there are few documented studies for reference. Secondary data was collected from government publications, websites, internal records and reports, conference proceedings, research articles, and books, among others. The data collected was analysed thematically. The findings show that due to the many devastating terrorist attacks in Kenya, a number of legal measures have been progressively initiated to strengthen the security of all aspects of Kenya’s commercial civil aviation against terror attacks. These include the protection of Aircraft Act, 1970 (revised in 2012). Article 2(6) of the Constitution of Kenya provides that any treaty or convention ratified by Kenya shall form part of the law of Kenya. Another Act put in place is The Civil Aviation Act, 2002 (revised 2013), which established the KCAA to regulate and oversee aviation safety and security as guided by the provisions of the Convention on the International Civil Aviation. There is also the Kenya Security Laws Amendment Act, 2014 (Section 75) which provided for the establishment of a mechanism for coordinating counter-terrorism measures in all entry and exit ports in the country. There are also numerous regulatory strategies adopted to combat terrorism in Kenya’s aviation industry. The country has also put in place elaborate regulations on Preventive Security Measures contained in Part IV of the Civil Aviation (Security) Regulations, 2019. Further, the country has instituted the training program with aims to ensure that personnel of all entities involved with or responsible for the implementation of various aspects of aviation security are properly trained on the appropriate standards for tasks in accordance with the national civil aviation security program. The country also undertakes Aviation Security Audits and Reviews.  It can thus be concluded that Kenya has adopted elaborate legal and regulatory responses to combat terrorism in the aviation industry. These have been largely successful in combating aviation terrorism in Kenya. Based on the study findings, there is a need for regular reviews of the various legal and regulatory responses to combatting terrorism in Kenya to enhance their efficacy and responsiveness to the dynamism of international terrorism. Furthermore, the training strategies should be strengthened through increased funding to enhance the domestication of the various legal and regulatory responses in the various aviation security agencies in Kenya. KCAA should also increase the frequency of aviation security audits, inspections, system tests, investigations, and surveys on airports, airlines, cargo agents, and inflight catering operators among others in response to increased sophistication of international terrorism.


Legal Concept ◽  
2021 ◽  
pp. 174-183
Author(s):  
Alexander Sarychev ◽  
◽  
Ivan Arkhiptsev ◽  
Ekaterina Karaulova ◽  
◽  
...  

Introduction: Aviation Security Service is an independent system that ensures the safety of air passengers and the airport as a whole. It has been given a free hand recently, namely, with the adoption of Federal Law No. 491-FZ Dated December 31, 2017 “On Amending the Aviation Code of the Russian Federation for ensuring aviation security”. Before the enactment, these functions were fulfilled by the police. In its activities, the police used some technical means necessary to identify the objects prohibited in circulation, but after the transfer of such powers to the Aviation Security Service, there was a process of improving and digitalizing technical devices, which contributed to improving the quality of screening air passengers, baggage and airport facilities. In its activities, the Aviation Security Service uses a highly systematic improved safety technology; a huge range of high-tech devices is used to ensure this service. But despite the improvement of technologies in the inspection system, the broadening of powers of the Aviation Security Service, there are also several shortcomings in its activities. Such are the gaps in the regulatory framework both for the Aviation Security Service itself and for interaction with the territorial Departments of Internal Affairs in transport. In addition, there is poor recruitment of personnel and corruption component in this area. Purpose: the purpose of the study is to analyze the features of aviation security in Russia and develop measures to improve the activities of the Aviation Security Service. Research methods: the methodological framework for the study is made up of the general scientific methods of cognition. To ensure the objectivity of the research, the analyzed problem is revealed by the authors as a phenomenon using a systematic approach, which allows us to reveal its mechanism in such a way that the theoretical provisions are used with maximum efficiency in practical activities. Research results and conclusions: the authors highlight the features of the activities of the Aviation Security Service in Russia during inspection measures, and also identify the main security problems at the airports.


Author(s):  
Kevin Zish ◽  
David Band ◽  
Kristopher Korbelak ◽  
Daniel Endres ◽  
Charles McKee ◽  
...  

In aviation security, avatars are generic human figures that are used to display alarms provided by on-person screening systems. One critical feature of these avatars is that they provide no body detail unique to an individual traveler. However, the generic nature of these avatars leaves few landmarks that can be used to map the location of an alarm on the avatar to a passenger. We manipulated two features of an avatar, body detail and grid lines, to create 6 avatars to investigate how design influences estimation of target location. Body detail was manipulated at three levels: no joints, some joints, and direct outline of the passenger. Grid lines were manipulated at two levels: grid lines or no grid lines. The results of the study showed that security screeners were nearly 20% closer to the true target location when the avatar featured landmarks that can be found on a typical passenger.


2021 ◽  
Vol 4 (2) ◽  
pp. 1034-1044
Author(s):  
Maria Magdalena Bate'e
Keyword(s):  

Poin terpenting dalam penelitian ini adalah menganalisis Sistem Informasi Manajemen dalam menangani setiap kasus pelanggaran yang terjadi di Bandara Binaka, apa yang dimaksud dengan pelangaran melawan hukum serta apa saja jenis pelanggaran tersebut, dan bagaimana Standar Operasional Prosedur petugas pengamanan Bandara Binaka dalam mengamankan Bandara dari tindakan melawan hukum. Jenis penelitian yang digunakan dalam penelitian ini adalah jenis penelitian kualitatif deskriptif. Yang menjadi populasi dalam penelitian ini adalah seluruh anggota aviation security Bandar Udara Binaka Gunungsitoli berjumlah 24 orang, dan sampel dalam penelitian ini diambil berdasarkan pengambilan sampel secara insidental. Kemudian  jenis data yang digunakan peneliti dalam penelitian ini yaitu data primer dan data sekunder. Kedua jenis data ini dapat diperoleh dengan cara observasi dan wawancara. Selanjutnya, data yang sudah diperoleh dari objek penelitian akan dianalisa dengan teknik analisa data deskriptif  kualitatif. Hasil dari penelitian ini yakni Bandara Binaka memiliki Sistem pengamanan yang disebut dengan Airport Safety yang digunakan oleh petugas AVSEC Bandara dalam menjalankan SOP penanganan gangguan keamanan Bandara, dengan menggunakan tegnologi-tegnologi yang canggih seperti x-ray, WTMD, HHMD, radar, CCTV dan peralatan canggih lainnya.


Sign in / Sign up

Export Citation Format

Share Document