| ACKNOWLEDGEMENTS | 第4-5页 |
| ABSTRACT | 第5-6页 |
| 摘要 | 第7-17页 |
| 1 INTRODUCTION | 第17-20页 |
| 1.1 Research Background | 第17-18页 |
| 1.2 Research Significance | 第18页 |
| 1.3 Research Method | 第18-19页 |
| 1.4 Research Contents | 第19-20页 |
| 2 LITERATURE REVIEW | 第20-24页 |
| 2.1 Basic concepts | 第20页 |
| 2.2 Operational Risk Theory | 第20-21页 |
| 2.3 The CPTED Theory | 第21页 |
| 2.4 The Five Ds Theory | 第21-22页 |
| 2.5 Level of Security Theory | 第22-23页 |
| 2.6 Applied Ethics Theory | 第23-24页 |
| 3 CASE DESCRIPTION | 第24-52页 |
| 3.1 Fed Ex development introduction | 第24-25页 |
| 3.2 Fed Ex development in China | 第25-26页 |
| 3.3 Fed Ex Security system introduction | 第26-30页 |
| 3.3.1 Professional Corperate Security team | 第27-29页 |
| 3.3.2 Professional Professional Corporate Security System | 第29页 |
| 3.3.3 Smart Cases Investigation System-ESIMS | 第29-30页 |
| 3.4 Typical cases in shipments transition process at Fed Ex | 第30-52页 |
| 3.4.1 Teft Cases | 第31-36页 |
| 3.4.2 Facility and Asset Cases | 第36-37页 |
| 3.4.3 Fraud cases | 第37-39页 |
| 3.4.4 Unauthorized Agent cases | 第39-42页 |
| 3.4.5 Code of business conduct and ethic cases | 第42-44页 |
| 3.4.6 Smuggling cases | 第44-45页 |
| 3.4.7 Drug trafficking cases | 第45-47页 |
| 3.4.8 Aviation Security cases | 第47-52页 |
| 4 CASE ANALYSIS | 第52-71页 |
| 4.1 What the Corporate Security is | 第52-55页 |
| 4.2 How to identify security system risk and vulnerabilities | 第55-71页 |
| 4.2.1 Analysis from the aspect of Cargo Theft | 第56-61页 |
| 4.2.2 Analysis from the aspect of Employee | 第61-63页 |
| 4.2.3 Analysis from the aspect of Physical Security | 第63-66页 |
| 4.2.4 Analysis from the aspect of Freight Forwarder | 第66-70页 |
| 4.2.5 Analysis from the aspect of Aviation Security | 第70-71页 |
| 5 SUGGESTIONS | 第71-78页 |
| 5.1 Clear Security service strategy | 第71-72页 |
| 5.2 Optimize the organization structure of Security department | 第72-73页 |
| 5.3 Recruiting talents, provide sufficiency supportive for employee growth | 第73-76页 |
| 5.4 Develop Security data analysis system locally, enhance risk prevention | 第76-77页 |
| 5.5 Development Security culture in the organization | 第77-78页 |
| 6 CONCLUSION | 第78-79页 |
| REFERENCE | 第79-81页 |