A better way to pay for homeland security

Piper, Ed
January 2003
Journal of Commerce (1542-3867);1/20/2003, Vol. 4 Issue 3, p37
Comments on homeland security regulations that deputized the business community to serve as the front line of defense in the war against terrorism in the U.S. Cost of compliance to deputization; Information on the government's financial strategy for protecting ports and vessel; Suggestions for government-private sector partnership.


Related Articles

  • Business groups: Security rule would cost $20 billion. Tiron, Roxana // Hill;10/22/2008, Vol. 15 Issue 120, p14 

    The article reports that the Customs and Border Protection (CBP) rule by the Department of Homeland Security (DHS) will cost U.S. companies with $20 billion.

  • What should we do now? Schwartz, Allan // Westchester County Business Journal;8/2/2004, Vol. 43 Issue 31, pS3 

    Focuses on the assistance offered by the American College of Forensic Examiners International to business enterprises in preparing for emergency planning in the U.S. Protection of lives, property and assets in critical times; Introduction of three levels of Board Certification in Homeland...

  • Security Issues in Southern Russia. Malysheva, D. // Russian Politics & Law;Nov/Dec2002, Vol. 40 Issue 6, p62 

    Focuses on security issues in Southern Russia. Economic interests of transnational companies; Efforts to achieve global strategic goals involving access to natural resources; Improvement in the relations between the ten units of the Russian Federation.

  • Sharpening up the Point.  // Finance Week;6/29/2005, p44 

    Reports on the development of the tourism and business enterprises in Durban, South Africa. Improvement of the environment for residents; Refurbishment of 25 Edwardian houses; Enhancement of national security and improved technology in its amenities.

  • Business Environment Outlook.  // China Tourism Report;Q3 2010, p32 

    The article discusses the market outlook of the Business Monitor International (BMI) Ltd. for the business sector of China for the third quarter of 2010. It explains the factors behind the low composite security risk rating of China. The potential rivalry that North East Asia will pose to China,...

  • Institutional persistence and the material transformation of the US national labs: The curious story of the advent of the Advanced Photon Source. Westfall, Catherine // Science & Public Policy (SPP);Aug2012, Vol. 39 Issue 4, p439 

    The 1990s saw a radical shift in the US investment in large-scale projects along with a shift in the rationale for US support of such projects and the national laboratories which host them. Previously, the largest projects were for the esoteric field of high energy and justifications drew on the...

  • White Paper Helps Government and Business in Managing Identity Verification of Citizens and Visitors.  // PA Times;Aug2003, Vol. 26 Issue 8, p10 

    Focuses on the recommendations for identity verification of citizens and visitors by government and businesses in the U.S. Need for cooperation between governments and the private sector; Public governance of identity management; Establishment of identity-security clearinghouse.

  • Police map LI 'terror targets' Schachter, Ken // Long Island Business News (7/1993 to 5/2009);5/28/2004, Vol. 51 Issue 23, p1A 

    Focuses on the Operation Safeguard program of Long Island, New York which identifies and warns businesses deemed potential targets of terrorists. Initiatives of the program; Similar program of the New York City Police Department in the wake of the 9/11 attacks on the World Trade Center and...

  • Examine China's Motives. Williams, Tom // Quality;Sep2005, Vol. 44 Issue 9, p8 

    Shares the personal account of the author regarding his experiences in doing business in China. Notorious record of Chinese companies on abusing intellectual property rights; Assessment of the national security risks in the country; Benefits and disadvantages in doing business with Chinese...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics