How to Contact Us.
How to Contact Us.

How to Contact Us.

 

How to Contact Us.
We offer services to you combining head (cognition), heart (empathy), and hand (practice)!

 

TMCSF ESTABLISHED 1998

 

How to Contact Us.
How to Contact US: Email or phone. Various communicative passages  exist, despite the perception of limited options at the beginning.

 

 

     

     

    How to Contact Us.
    Contact us from Alberta, British Columbia and Manitoba or the United States. For example,  if you find yourself in the charming alpine town of Hope, British Columbia, feel free to contact us via phone or email.

     

    Contact Us: Consider What to Share

    Please get in touch with us, and please be aware that certain conditions and limitations may apply. It is important to consider the potential risks to personal privacy associated with technology. Take the time to carefully evaluate the extent and depth of the personal information you choose to share in networked environments. Using technology creates potential risks, which is why there is a concern for safeguarding sensitive information such as financial details, drivers’ licenses and other personal data. We are delighted to connect with you. Read More

     

    How to Contact Us.
    Contact Us: However, it is important to consider the potential risks to personal privacy associated with technology. Take the time to carefully evaluate the extent and depth of the personal information you choose to share in networked environments.

     

    Contact us from Land or Sea

    You can even reach out to us via phone or email while you are on your sea journey. Kindly refrain from sharing any personal information, such as your banking details, for security purposes. Cybertechnology encompasses computers, communication devices, network components, data, and multimedia (Baase, 2003; Boyes, 2014).

    The Internet and its networks are often in a state of constant change and can be quite chaotic, and information is regularly evolving. The advancements in technology are challenging the current regulations and viewpoints in maritime and other industries. The integration of technology is visible in work tasks, navigation, communication, and business processes (Sveinung, et al., 2018). Regrettably, both robust technological systems and delicate human systems are vulnerable to breaches (Clark, 2017; Direnzo, et al., 2017; Moskoff & Kaag, 2017).

    References

    Baase, S. (2003). A gift of fire. Social, legal, and ethical issues for computers and the Internet. Prentice-Hall.

    Boyes, H. (2014). Maritime cyber security: Securing the digital seaways. Resilience, security & risk in transport. Institution of Engineering and Technology. 

    https://digital-library.theiet.org/content/reference/10.1049/etr.2014.0009 

    Clark, B. G. (2017). Commercial maritime cyber security risk and vulnerability: What we did not know, we did not know. In J. Direnzo, N. K. Drumhiller & F. S. Roberts (Eds.). Issues in maritime cyber security (pp. 129–181). Westphalia Press.

    Direnzo, J., Drumhiller, N. K., & Roberts, F. S. (2017). Preface. In J. Direnzo, N. K. Drumhiller & F. S. Roberts (Eds.). Issues in maritime cyber security (pp. ix–xiii).  Westphalia Press.

    Kahn, R. & Stavrou, E. (2020). The executive’s guide to navigating the information universe. American Bar Association.

    Moskoff, D. B., & Kaag, W. G. (2017). Threats to global navigation. In J. Direnzo, N. K. Drumhiller, & F. S. Roberts (Eds.). Issues in maritime cyber security (pp. 3–17). Westphalia Press.

    Sveinung, H. O., Oyvind, J., Lund, M. S., Runa, 0., & Kirsi, H. (2018). Enhancing navigator competence by demonstrating maritime cyber security. The Journal of Navigation, 71 (5), 1025-1039. Cambridge University.

    https://www.cambridge.org/core/journals/journal-of-navigation/article/abs/enhancing-navigator-competence-by-demonstrating-maritime-cyber-security/AF9FD35689C5B5F879B2446722B5CA1B 

    © 1998-2024 TMCSF & TMCASF