SlideShare una empresa de Scribd logo
1 de 5
Parsons 1

Rebekah Parsons

English 101

Professor Bolton

November 8, 2012

                                        Annotated Bibliography

       I was shocked after reading “Signal Detection,” by Steven Casey. The text tells the story of

Richard Reid, who managed to get through airport security with a bomb in his shoe. Luckily, the flight

attendants and passengers on boardwere able to stop him and landed safely. I began to wonder what

could have been done to prevent Richard Reid from boarding that plane.

       Before September 9, 2001, terrorism did not present a major threat to air travelers. Since then,

though, airport security systems have been a major deal. However, if other terrorists, Richard Reid

being only one example, can still manage to get through security and onto an airplane, then something

has to be done. Airport security systems need to be improved in order to keep people safe.

Suggestions to better the security networks have been made: install new technologies, or follow new

procedures. Some airports have listened to these suggestions and upgraded their security. Airport

security systems should always be changing in order to keep up with the new technologies and

equipment being produced. Also, altering and updating the security systems will keep terrorists on

their toes, and hopefully catch them before any harm can be done. Although airport security is such a

hassle to go through, one should keep in mind the importance of it. Ultimately, what is at stake here is

the future of our country.



Fultz, Keith O. Opposing Viewpoints: Terrorism. San Diego: Greenhaven Press, Inc., 2000. Print.

       Opposing Viewpoints Series.

       In this source, different technologies and procedures are talked about that can improve the
Parsons 2

security at airports. These systems include the computer-assisted passenger screening (CAPS) system,

explosives detection technologies, and matching checked bags to the passengers. Another topic

discussed in the book is how the Federal Aviation Administration (FAA) should assess vulnerability.

One way is a standardized model developed by the FAA for conducting airport vulnerability

assessments. Second, is for the FAA and the FBI to assess threats and vulnerabilities at high-risk

airports together. Lastly, airports should conduct periodic vulnerability assessments. Another method

that can help improve airport security is having well trained employees:

       Improving the training and testing of people hired by these companies to screen passengers'

       baggage at airport security checkpoints would also improve aviation security. Regardless of

       advances in technology, the people who operate the equipment are the last and best line of

       defense against the introduction of any dangerous object into the aviation system. (Fultz 154)

The fact that the book is published and on the shelves at public libraries means it is credible and

trustworthy. The book was published in 2000 so the information is not very current, but I will use this

information to describe airport security before September 9, 2001.

       This information will be helpful in describing airport security before September 9, 2001 and

how it has changed. I can also use the information to examine the attitudes toward airline security at

that time.



Hawley, Kip. “The Gaps in Airport Security.” Los Angeles Times (2011): n.pag. SIRS Issues

       Researcher. Web. 04 Nov. 2012.

       Hawley describes how in the United States, security responsibility is divided according to who

performs the activity. He explains that the Transportation Security Administration (TSA) personnel,

airport law enforcement officers,and vendors all perform different tasks, and when there is a “systemic

failure” (Hawley, par. 1), each claim they did their part. Also, TSA publishes the requirements for each
Parsons 3

group, causing three things to happen: “vulnerability is embedded where those measures are weak; the

minimum required becomes the maximum undertaken by the security players; and the regulated party

feels protected from blame because it did what was required” (Hawley, par. 3). Hawley proposes three

ways to improve the security. He says that several layers of security are needed throughout the airport

that are frequently changing and appear random. Additionally, everyone must share responsibility for

security outcomes, and lastly, assessments of risk-management resources.

       This article was published in 2011, just a year ago. Hawley is aware of the procedures of

airport security and how it works. He has also spent time researching information about TSA and has

studied different ways to improve airport security.

       Since my research paper is on the flaws of airport security, this source will help provide

information. This article gives an instance where the security can be improved and offers

recommendations to better the system. I can use the instance and recommendations given as examples.



Holbrook, Emily. “Airport Security: Privacy vs. Safety.” Risk Management 57.2 (2010): n.pag.

       Academic OneFile. Web. 04 Nov. 2012.

       In this article, Holbrook talks about the security systems of airports after September 11, 2001.

She starts off by giving examples of other attempted terrorist attacks. Since 9/11, some procedures

have been modified and put in place in order to catch terrorists, but these have also brought about

criticism. Full-body scanners and backscatter x-rays, according to Holbrook, are the most

controversial; people argue that these violate personal privacy and could cause health problems. Some

people believe the aviation security networks are dangerously flawed. William Daly, a former FBI

investigator, said, “Airline security resembles 'swiss cheese,' in that there are so many holes for

terrorists to infiltrate airliners and airports” (qtd. in Holbrook, par. 10). Others think it is a good idea to

prepare and teach the passengers how to handle dangerous situations.
Parsons 4

       Since the article was published in 2010, two years ago, the information is current. Holbrook has

researched the different terrorist attacks and the Obama administration's response to the most recent

attack. She has studied what others have said about this subject as well.

       This article will help support my thesis that airport security systems have flaws. It also provides

a way in which security can by improved, by informing passengers. I can use this article for a

counterargument too. The criticism of privacy and concern about health effects from the security

systems could be a reason not to use the updated procedures.



Opportunities to Improve Airport Passenger Screening with Mass Spectrometry. National Academies

       Press, 2004. eBook Collection (EBSCOhost). Web. 06 Nov. 2012.

       The book, Opportunities to Improve Airport Passenger Screening with Mass Spectrometry,

describes different technologies designed for screening baggage and passengers in order to “protect the

traveling public from attacks on the commercial aviation system involving explosives” (1).One of the

technologies talked about is explosive detection systems (EDSs), which is designed to detect objects

with dimensions and densities similar to explosive materials. Explosive trace detectors (ETDs), on the

other hand, are used to detect vapor or particles of explosive materials. Most of the material used to

make bombs is “very sticky, and once a finger has been in contact with the explosive, it is capable of

leaving many subsequent fingerprints (on briefcases, clothes, boarding passes, etc.) with detectable

amounts of material” (Opportunities1). Since the materials made to make bombs can be left behind,

ETDs are effective in detecting the traces of explosives.

       This eBook was published in 2004, which is eight years ago. Eight years is certainly a gap;

however, the information will be effective in describing the technology used in airport security soon

after September 9, 2001. This source is also credible because it has been published into the

EBSCOhost database.
Parsons 5

       The information in this source will be helpful when describing the different technologies

airports use to detect explosives. I can also use this information to explain how these different

technologies work.



Outsmarting Terror. “Airport/Airplane Security.” Films Media Group, 2006. Films on Demand. Web.

       04 Nov. 2012 <http://storm.hgtc.edu:2048/login?

       url=http://digital.films.com/PortalPlaylists.aspx? aid=3503&xtid=40808&loid=90555>.

       This film discusses some of the different technologies airports use. Until recently, x-rays were

the most common and main technology used in airports. However, x-rays are not enough in the

modern war on terror. X-rays cannot detect plastic, a common ingredient in explosives, or tell the

difference between a bar of chocolate and TNT. The film also talks about Richard Reid, the shoe

bomber. The explosives in his show were “impossible to see on x-ray” (Outsmarting Terror,

“Airport/Airplane Security”). After this incident, passengers were required to remove shoes when

going through security. Airports have started using new technologies that use the senses of sight and

smell. Since “each plane is a potential target,” (Outsmarting Terror, “Airport/Airplane Security”)

airports should make sure the security systems used are effective in detecting terrorists.

       This film uses recent information because events after September 9, 2001 are described.

Research on x-rays and the different technologies that airports use has been done. Studies on Richard

Reid also had to be done in order to provide the information.

       I can use this film in my research paper to simply describe some of the technologies airports

use. The additional information on Richard Reid will be helpful as well since he is talked about in

“Signal Detection,” the story that has provoked me. I can also use the film to show an effect caused by

an attempted terrorist attack.

Más contenido relacionado

Similar a Annotated bib revised final

Airport Security Essay
Airport Security EssayAirport Security Essay
Airport Security EssayBuy Essay .
 
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docx
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docxRunning head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docx
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docxSUBHI7
 
A TASK BASED information break down of COUNTERING UAV
A TASK BASED information break down of COUNTERING UAVA TASK BASED information break down of COUNTERING UAV
A TASK BASED information break down of COUNTERING UAVEdwin Hofte
 
The Security Administration ( Tsa )
The Security Administration ( Tsa )The Security Administration ( Tsa )
The Security Administration ( Tsa )Kelley Hunter
 
As journalists, weknow the power of words.The phrase th.docx
As journalists, weknow the power of words.The phrase th.docxAs journalists, weknow the power of words.The phrase th.docx
As journalists, weknow the power of words.The phrase th.docxfredharris32
 
Select one of the following options to complete this assignment.docx
Select one of the following options to complete this assignment.docxSelect one of the following options to complete this assignment.docx
Select one of the following options to complete this assignment.docxlvernon1
 
Reader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docxReader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docxniraj57
 
Final Exam Part OneCNT 3604Due June 22. 2017Take Home Part .docx
Final Exam Part OneCNT 3604Due June 22. 2017Take Home Part   .docxFinal Exam Part OneCNT 3604Due June 22. 2017Take Home Part   .docx
Final Exam Part OneCNT 3604Due June 22. 2017Take Home Part .docxssuser454af01
 
Running Head SAFETY IN AVIATION .docx
Running Head SAFETY IN AVIATION                                  .docxRunning Head SAFETY IN AVIATION                                  .docx
Running Head SAFETY IN AVIATION .docxcharisellington63520
 
Running Head SAFETY IN AVIATION .docx
Running Head SAFETY IN AVIATION                                  .docxRunning Head SAFETY IN AVIATION                                  .docx
Running Head SAFETY IN AVIATION .docxtodd521
 

Similar a Annotated bib revised final (18)

Airport Security Essay
Airport Security EssayAirport Security Essay
Airport Security Essay
 
Airport Security Essay
Airport Security EssayAirport Security Essay
Airport Security Essay
 
Airport Security
Airport SecurityAirport Security
Airport Security
 
Airport Security Essay
Airport Security EssayAirport Security Essay
Airport Security Essay
 
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docx
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docxRunning head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docx
Running head A CASE STUDY OF THE TSA’S RESOURCE ALLOCATION1A.docx
 
A TASK BASED information break down of COUNTERING UAV
A TASK BASED information break down of COUNTERING UAVA TASK BASED information break down of COUNTERING UAV
A TASK BASED information break down of COUNTERING UAV
 
The Security Administration ( Tsa )
The Security Administration ( Tsa )The Security Administration ( Tsa )
The Security Administration ( Tsa )
 
Thesis
ThesisThesis
Thesis
 
As journalists, weknow the power of words.The phrase th.docx
As journalists, weknow the power of words.The phrase th.docxAs journalists, weknow the power of words.The phrase th.docx
As journalists, weknow the power of words.The phrase th.docx
 
Select one of the following options to complete this assignment.docx
Select one of the following options to complete this assignment.docxSelect one of the following options to complete this assignment.docx
Select one of the following options to complete this assignment.docx
 
403 8
403 8403 8
403 8
 
Reader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docxReader ResponseAirport Security Debate 60 points1. Read the .docx
Reader ResponseAirport Security Debate 60 points1. Read the .docx
 
srproj_fields_fall16
srproj_fields_fall16srproj_fields_fall16
srproj_fields_fall16
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Research Paper
Research PaperResearch Paper
Research Paper
 
Final Exam Part OneCNT 3604Due June 22. 2017Take Home Part .docx
Final Exam Part OneCNT 3604Due June 22. 2017Take Home Part   .docxFinal Exam Part OneCNT 3604Due June 22. 2017Take Home Part   .docx
Final Exam Part OneCNT 3604Due June 22. 2017Take Home Part .docx
 
Running Head SAFETY IN AVIATION .docx
Running Head SAFETY IN AVIATION                                  .docxRunning Head SAFETY IN AVIATION                                  .docx
Running Head SAFETY IN AVIATION .docx
 
Running Head SAFETY IN AVIATION .docx
Running Head SAFETY IN AVIATION                                  .docxRunning Head SAFETY IN AVIATION                                  .docx
Running Head SAFETY IN AVIATION .docx
 

Más de bekahpars

Text analysis essay revised final (website)
Text analysis essay revised final (website)Text analysis essay revised final (website)
Text analysis essay revised final (website)bekahpars
 
Technology essay revised final (website)
Technology essay revised final (website)Technology essay revised final (website)
Technology essay revised final (website)bekahpars
 
Text analysis essay revised final (website)
Text analysis essay revised final (website)Text analysis essay revised final (website)
Text analysis essay revised final (website)bekahpars
 
Text analysis essay revised final (website)
Text analysis essay revised final (website)Text analysis essay revised final (website)
Text analysis essay revised final (website)bekahpars
 
Technology essay revised final (website)
Technology essay revised final (website)Technology essay revised final (website)
Technology essay revised final (website)bekahpars
 
Technology essay rev.
Technology essay rev.Technology essay rev.
Technology essay rev.bekahpars
 
Technology essay rev. 2
Technology essay rev. 2Technology essay rev. 2
Technology essay rev. 2bekahpars
 

Más de bekahpars (7)

Text analysis essay revised final (website)
Text analysis essay revised final (website)Text analysis essay revised final (website)
Text analysis essay revised final (website)
 
Technology essay revised final (website)
Technology essay revised final (website)Technology essay revised final (website)
Technology essay revised final (website)
 
Text analysis essay revised final (website)
Text analysis essay revised final (website)Text analysis essay revised final (website)
Text analysis essay revised final (website)
 
Text analysis essay revised final (website)
Text analysis essay revised final (website)Text analysis essay revised final (website)
Text analysis essay revised final (website)
 
Technology essay revised final (website)
Technology essay revised final (website)Technology essay revised final (website)
Technology essay revised final (website)
 
Technology essay rev.
Technology essay rev.Technology essay rev.
Technology essay rev.
 
Technology essay rev. 2
Technology essay rev. 2Technology essay rev. 2
Technology essay rev. 2
 

Annotated bib revised final

  • 1. Parsons 1 Rebekah Parsons English 101 Professor Bolton November 8, 2012 Annotated Bibliography I was shocked after reading “Signal Detection,” by Steven Casey. The text tells the story of Richard Reid, who managed to get through airport security with a bomb in his shoe. Luckily, the flight attendants and passengers on boardwere able to stop him and landed safely. I began to wonder what could have been done to prevent Richard Reid from boarding that plane. Before September 9, 2001, terrorism did not present a major threat to air travelers. Since then, though, airport security systems have been a major deal. However, if other terrorists, Richard Reid being only one example, can still manage to get through security and onto an airplane, then something has to be done. Airport security systems need to be improved in order to keep people safe. Suggestions to better the security networks have been made: install new technologies, or follow new procedures. Some airports have listened to these suggestions and upgraded their security. Airport security systems should always be changing in order to keep up with the new technologies and equipment being produced. Also, altering and updating the security systems will keep terrorists on their toes, and hopefully catch them before any harm can be done. Although airport security is such a hassle to go through, one should keep in mind the importance of it. Ultimately, what is at stake here is the future of our country. Fultz, Keith O. Opposing Viewpoints: Terrorism. San Diego: Greenhaven Press, Inc., 2000. Print. Opposing Viewpoints Series. In this source, different technologies and procedures are talked about that can improve the
  • 2. Parsons 2 security at airports. These systems include the computer-assisted passenger screening (CAPS) system, explosives detection technologies, and matching checked bags to the passengers. Another topic discussed in the book is how the Federal Aviation Administration (FAA) should assess vulnerability. One way is a standardized model developed by the FAA for conducting airport vulnerability assessments. Second, is for the FAA and the FBI to assess threats and vulnerabilities at high-risk airports together. Lastly, airports should conduct periodic vulnerability assessments. Another method that can help improve airport security is having well trained employees: Improving the training and testing of people hired by these companies to screen passengers' baggage at airport security checkpoints would also improve aviation security. Regardless of advances in technology, the people who operate the equipment are the last and best line of defense against the introduction of any dangerous object into the aviation system. (Fultz 154) The fact that the book is published and on the shelves at public libraries means it is credible and trustworthy. The book was published in 2000 so the information is not very current, but I will use this information to describe airport security before September 9, 2001. This information will be helpful in describing airport security before September 9, 2001 and how it has changed. I can also use the information to examine the attitudes toward airline security at that time. Hawley, Kip. “The Gaps in Airport Security.” Los Angeles Times (2011): n.pag. SIRS Issues Researcher. Web. 04 Nov. 2012. Hawley describes how in the United States, security responsibility is divided according to who performs the activity. He explains that the Transportation Security Administration (TSA) personnel, airport law enforcement officers,and vendors all perform different tasks, and when there is a “systemic failure” (Hawley, par. 1), each claim they did their part. Also, TSA publishes the requirements for each
  • 3. Parsons 3 group, causing three things to happen: “vulnerability is embedded where those measures are weak; the minimum required becomes the maximum undertaken by the security players; and the regulated party feels protected from blame because it did what was required” (Hawley, par. 3). Hawley proposes three ways to improve the security. He says that several layers of security are needed throughout the airport that are frequently changing and appear random. Additionally, everyone must share responsibility for security outcomes, and lastly, assessments of risk-management resources. This article was published in 2011, just a year ago. Hawley is aware of the procedures of airport security and how it works. He has also spent time researching information about TSA and has studied different ways to improve airport security. Since my research paper is on the flaws of airport security, this source will help provide information. This article gives an instance where the security can be improved and offers recommendations to better the system. I can use the instance and recommendations given as examples. Holbrook, Emily. “Airport Security: Privacy vs. Safety.” Risk Management 57.2 (2010): n.pag. Academic OneFile. Web. 04 Nov. 2012. In this article, Holbrook talks about the security systems of airports after September 11, 2001. She starts off by giving examples of other attempted terrorist attacks. Since 9/11, some procedures have been modified and put in place in order to catch terrorists, but these have also brought about criticism. Full-body scanners and backscatter x-rays, according to Holbrook, are the most controversial; people argue that these violate personal privacy and could cause health problems. Some people believe the aviation security networks are dangerously flawed. William Daly, a former FBI investigator, said, “Airline security resembles 'swiss cheese,' in that there are so many holes for terrorists to infiltrate airliners and airports” (qtd. in Holbrook, par. 10). Others think it is a good idea to prepare and teach the passengers how to handle dangerous situations.
  • 4. Parsons 4 Since the article was published in 2010, two years ago, the information is current. Holbrook has researched the different terrorist attacks and the Obama administration's response to the most recent attack. She has studied what others have said about this subject as well. This article will help support my thesis that airport security systems have flaws. It also provides a way in which security can by improved, by informing passengers. I can use this article for a counterargument too. The criticism of privacy and concern about health effects from the security systems could be a reason not to use the updated procedures. Opportunities to Improve Airport Passenger Screening with Mass Spectrometry. National Academies Press, 2004. eBook Collection (EBSCOhost). Web. 06 Nov. 2012. The book, Opportunities to Improve Airport Passenger Screening with Mass Spectrometry, describes different technologies designed for screening baggage and passengers in order to “protect the traveling public from attacks on the commercial aviation system involving explosives” (1).One of the technologies talked about is explosive detection systems (EDSs), which is designed to detect objects with dimensions and densities similar to explosive materials. Explosive trace detectors (ETDs), on the other hand, are used to detect vapor or particles of explosive materials. Most of the material used to make bombs is “very sticky, and once a finger has been in contact with the explosive, it is capable of leaving many subsequent fingerprints (on briefcases, clothes, boarding passes, etc.) with detectable amounts of material” (Opportunities1). Since the materials made to make bombs can be left behind, ETDs are effective in detecting the traces of explosives. This eBook was published in 2004, which is eight years ago. Eight years is certainly a gap; however, the information will be effective in describing the technology used in airport security soon after September 9, 2001. This source is also credible because it has been published into the EBSCOhost database.
  • 5. Parsons 5 The information in this source will be helpful when describing the different technologies airports use to detect explosives. I can also use this information to explain how these different technologies work. Outsmarting Terror. “Airport/Airplane Security.” Films Media Group, 2006. Films on Demand. Web. 04 Nov. 2012 <http://storm.hgtc.edu:2048/login? url=http://digital.films.com/PortalPlaylists.aspx? aid=3503&xtid=40808&loid=90555>. This film discusses some of the different technologies airports use. Until recently, x-rays were the most common and main technology used in airports. However, x-rays are not enough in the modern war on terror. X-rays cannot detect plastic, a common ingredient in explosives, or tell the difference between a bar of chocolate and TNT. The film also talks about Richard Reid, the shoe bomber. The explosives in his show were “impossible to see on x-ray” (Outsmarting Terror, “Airport/Airplane Security”). After this incident, passengers were required to remove shoes when going through security. Airports have started using new technologies that use the senses of sight and smell. Since “each plane is a potential target,” (Outsmarting Terror, “Airport/Airplane Security”) airports should make sure the security systems used are effective in detecting terrorists. This film uses recent information because events after September 9, 2001 are described. Research on x-rays and the different technologies that airports use has been done. Studies on Richard Reid also had to be done in order to provide the information. I can use this film in my research paper to simply describe some of the technologies airports use. The additional information on Richard Reid will be helpful as well since he is talked about in “Signal Detection,” the story that has provoked me. I can also use the film to show an effect caused by an attempted terrorist attack.