Practitioner's Guide to Effective Maritime and Port Security.
By: Edgerton, Michael.Material type: BookPublisher: Hoboken, N.J. : Wiley 2013Description: 1 online resource (1 online resource (296 pages)).Content type: text Media type: computer Carrier type: online resourceISBN: 9781299907676; 1299907679; 1118633199; 9781118633199; 9781118633175; 1118633172; 9781118633151; 1118633156.Subject(s): Harbors -- Security measures | Shipping -- Security measures | Maritime terrorism -- Prevention | Harbors -- Security measures -- United States | Shipping -- Security measures -- United States | Maritime terrorism -- United States -- Prevention | BUSINESS & ECONOMICS -- Infrastructure | SOCIAL SCIENCE -- General | TechnologyGenre/Form: Electronic books.Additional physical formats: Print version:: No titleDDC classification: 363.28 | 363.289 Online resources: Wiley Online Library
Cover; Title Page; Copyright Page; Contents; Introduction; Foreword; PART ONE The International Maritime Operating Environment; CHAPTER 1 Unique Characteristics of Ports and International Shipping; Introduction; The Multinational Nature of Shipping and Business Drivers in Port Operations; Flag States; Vessel Registries; Types of Vessel Registries; Implications for Security; Third Country Owners; Implications for Security; Multinational Crews; Implications for Security; Port States; Regulatory Requirements; International Treaties and Codes; Oversight Mechanisms; Ship-Port Relationships.
The Supply ChainJust-in-Time Delivery; The Components of a Maritime Supply Chain; Regulatory Issues; Intermodal Links; CHAPTER 2 The Criticality of Ports: Why and How They Matter; Introduction; Geopolitical Considerations; Trade Routes; Trade Chokepoints; Sea Lines of Communication; Ports; Ports as Targets; Ports as Conduits; Cargo Theft; Smuggling; Ports as Borders; Intermodal Connections; PART TWO Threats to Ports and the Maritime Domain; CHAPTER 3 Threats; Introduction; Threats by States; State Actors; Conventional Military Attacks Against Ports; Conventional Attacks Against Supply Chains.
Asymmetric AttacksState Proxies; Proxy Tactics; Nonstate Actors; Terrorism; Criminal Activity; Piracy; Terrorism, State Actors, and Criminal Nexus; PART THREE Current Approaches to Maritime and Port Security; CHAPTER 4 Approaches to Security Policy Development; Introduction; Political Considerations; Commercial Interests; Costs of Implementation; Increased Government Oversight; Potential Delays; Domestic Political Constituencies; Container Screening; Port Security Grants; Measuring the Effectiveness of Security Measures; Deterrence; Punishment; Denial; Consequence Management.
Measurement of Activity vs. EffectivenessMeasurement of Activity; Resources Expended; Measurement of Criminal Activity; How to Measure Effectiveness; Why Don't We Do This Already?; The Maritime Context of Assessing Deterrence; Lack of a Risk Approach; What is Risk?; Dynamic Risk; Pure Risk; Fundamental Risk; Particular Risk; Components of Security Risk; Threat; Vulnerability; Consequence; Risk Management; The Weaknesses of Current Risk Management Approaches; Lack of Understanding of Security Risk Components; Lack of a Process to Determine Risk Tolerances.
Tendency Towards Risk Aversion or AvoidanceFocus on Risk Mitigation (Reduction) instead of Risk Treatment; Lack of Recognition of Critical Nodes in the Maritime Domain; Overquantifying Security Risk; Tendency to Use the Rubric of All-hazard Risk; A Propensity to Minimize the Element of Threat in Performing Security Risk Assessments; CHAPTER 5 A Critique of Current Maritime Security Measures and Approaches; Introduction; Regulations and Their Limits; The ISPS Code; Supply Chain Security; International Organization for Standardization.
Sets forth practices to ensure security and foster international trade Written with an international perspective, this book analyzes the complex set of factors affecting the security of port and maritime operations, including shipping, politics, economics, crime, and terrorism. Author Michael Edgerton critiques current approaches to maritime and port security based on his more than twenty-five years of experience in the field. He not only points out vulnerabilities in today's practices, but also provides a set of proven and tested recommendations that recognize the role and int.
Print version record.
Includes bibliographical references and index.