Abstract

Port security is one of the most important fields of Vocational Education and Training (VET) maritime studies. In this article, we propose the configuration of entities that are used to design a port security information system for VET education. Our work integrates recent maritime Information Technology (IT) concepts into VET. We record the initial design for building educational software for a school-level security information system that can be used as an extension project for the existing maritime curriculum of VET. This plan, if implemented and completed, will strengthen and expand the boundaries of school knowledge and curriculum. This article describes the design part of the whole project.

Highlights

  • According to the recent reforms in Vocational Education and Training (VET) in Greece, the students have the right to choose directions from the Maritime Specialties

  • We propose a completely new classification of entities for the design of an information system security modeling based on the latest directions of Information Technology (IT), as well as the curriculum data and the institutional framework for maritime studies in VET

  • In this article we have shown that modeling of the planned information system concerns all explicit or unambiguous marine factors we have shown that the project of design, modeling and implementation of a school-level security information system strengthens and expands the boundaries of school knowledge, especially as this curriculum pursues

Read more

Summary

INTRODUCTION

According to the recent reforms in Vocational Education and Training (VET) in Greece, the students have the right to choose directions from the Maritime Specialties (http://www.iep.edu.gr/el/naftiliakon-epaggelmaton). Based on Article of Law 2971/2001, “port zone” means the land and sea area, continuous or interrupted, in which the competent port administration and demersal operator can carry out the projects required to serve commercial, passenger, maritime, tourism and fishing traffic and, more generally, the good functioning of the port.

THE SAFETY SYSTEMS USED IN PORT AND THE THREATS TO PORT SECURITY
Security
Message Encryption
Procedure
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call