CENTRAL LIBRARY

Welcome to Online Public Access Catalogue (OPAC)

Amazon cover image
Image from Amazon.com

Practitioner's Guide to Effective Maritime and Port Security.

By: Material type: TextTextPublisher number: EB00174720 | Recorded BooksPublication details: Hoboken, N.J. : Wiley 2013.Description: 1 online resource (1 online resource (296 pages))Content type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9781299907676
  • 1299907679
  • 1118633199
  • 9781118633199
  • 9781118633175
  • 1118633172
  • 9781118633151
  • 1118633156
Subject(s): Genre/Form: Additional physical formats: Print version:: No titleDDC classification:
  • 363.28 363.289
LOC classification:
  • VK
Online resources:
Contents:
Cover; Title Page; Copyright Page; Contents; Introduction; Foreword; PART ONE The International Maritime Operating Environment; CHAPTER 1 Unique Characteristics of Ports and International Shipping; Introduction; The Multinational Nature of Shipping and Business Drivers in Port Operations; Flag States; Vessel Registries; Types of Vessel Registries; Implications for Security; Third Country Owners; Implications for Security; Multinational Crews; Implications for Security; Port States; Regulatory Requirements; International Treaties and Codes; Oversight Mechanisms; Ship-Port Relationships.
The Supply ChainJust-in-Time Delivery; The Components of a Maritime Supply Chain; Regulatory Issues; Intermodal Links; CHAPTER 2 The Criticality of Ports: Why and How They Matter; Introduction; Geopolitical Considerations; Trade Routes; Trade Chokepoints; Sea Lines of Communication; Ports; Ports as Targets; Ports as Conduits; Cargo Theft; Smuggling; Ports as Borders; Intermodal Connections; PART TWO Threats to Ports and the Maritime Domain; CHAPTER 3 Threats; Introduction; Threats by States; State Actors; Conventional Military Attacks Against Ports; Conventional Attacks Against Supply Chains.
Asymmetric AttacksState Proxies; Proxy Tactics; Nonstate Actors; Terrorism; Criminal Activity; Piracy; Terrorism, State Actors, and Criminal Nexus; PART THREE Current Approaches to Maritime and Port Security; CHAPTER 4 Approaches to Security Policy Development; Introduction; Political Considerations; Commercial Interests; Costs of Implementation; Increased Government Oversight; Potential Delays; Domestic Political Constituencies; Container Screening; Port Security Grants; Measuring the Effectiveness of Security Measures; Deterrence; Punishment; Denial; Consequence Management.
Measurement of Activity vs. EffectivenessMeasurement of Activity; Resources Expended; Measurement of Criminal Activity; How to Measure Effectiveness; Why Don't We Do This Already?; The Maritime Context of Assessing Deterrence; Lack of a Risk Approach; What is Risk?; Dynamic Risk; Pure Risk; Fundamental Risk; Particular Risk; Components of Security Risk; Threat; Vulnerability; Consequence; Risk Management; The Weaknesses of Current Risk Management Approaches; Lack of Understanding of Security Risk Components; Lack of a Process to Determine Risk Tolerances.
Tendency Towards Risk Aversion or AvoidanceFocus on Risk Mitigation (Reduction) instead of Risk Treatment; Lack of Recognition of Critical Nodes in the Maritime Domain; Overquantifying Security Risk; Tendency to Use the Rubric of All-hazard Risk; A Propensity to Minimize the Element of Threat in Performing Security Risk Assessments; CHAPTER 5 A Critique of Current Maritime Security Measures and Approaches; Introduction; Regulations and Their Limits; The ISPS Code; Supply Chain Security; International Organization for Standardization.
Summary: Sets forth practices to ensure security and foster international trade Written with an international perspective, this book analyzes the complex set of factors affecting the security of port and maritime operations, including shipping, politics, economics, crime, and terrorism. Author Michael Edgerton critiques current approaches to maritime and port security based on his more than twenty-five years of experience in the field. He not only points out vulnerabilities in today's practices, but also provides a set of proven and tested recommendations that recognize the role and int.
Tags from this library: No tags from this library for this title. Log in to add tags.
No physical items for this record

Cover; Title Page; Copyright Page; Contents; Introduction; Foreword; PART ONE The International Maritime Operating Environment; CHAPTER 1 Unique Characteristics of Ports and International Shipping; Introduction; The Multinational Nature of Shipping and Business Drivers in Port Operations; Flag States; Vessel Registries; Types of Vessel Registries; Implications for Security; Third Country Owners; Implications for Security; Multinational Crews; Implications for Security; Port States; Regulatory Requirements; International Treaties and Codes; Oversight Mechanisms; Ship-Port Relationships.

The Supply ChainJust-in-Time Delivery; The Components of a Maritime Supply Chain; Regulatory Issues; Intermodal Links; CHAPTER 2 The Criticality of Ports: Why and How They Matter; Introduction; Geopolitical Considerations; Trade Routes; Trade Chokepoints; Sea Lines of Communication; Ports; Ports as Targets; Ports as Conduits; Cargo Theft; Smuggling; Ports as Borders; Intermodal Connections; PART TWO Threats to Ports and the Maritime Domain; CHAPTER 3 Threats; Introduction; Threats by States; State Actors; Conventional Military Attacks Against Ports; Conventional Attacks Against Supply Chains.

Asymmetric AttacksState Proxies; Proxy Tactics; Nonstate Actors; Terrorism; Criminal Activity; Piracy; Terrorism, State Actors, and Criminal Nexus; PART THREE Current Approaches to Maritime and Port Security; CHAPTER 4 Approaches to Security Policy Development; Introduction; Political Considerations; Commercial Interests; Costs of Implementation; Increased Government Oversight; Potential Delays; Domestic Political Constituencies; Container Screening; Port Security Grants; Measuring the Effectiveness of Security Measures; Deterrence; Punishment; Denial; Consequence Management.

Measurement of Activity vs. EffectivenessMeasurement of Activity; Resources Expended; Measurement of Criminal Activity; How to Measure Effectiveness; Why Don't We Do This Already?; The Maritime Context of Assessing Deterrence; Lack of a Risk Approach; What is Risk?; Dynamic Risk; Pure Risk; Fundamental Risk; Particular Risk; Components of Security Risk; Threat; Vulnerability; Consequence; Risk Management; The Weaknesses of Current Risk Management Approaches; Lack of Understanding of Security Risk Components; Lack of a Process to Determine Risk Tolerances.

Tendency Towards Risk Aversion or AvoidanceFocus on Risk Mitigation (Reduction) instead of Risk Treatment; Lack of Recognition of Critical Nodes in the Maritime Domain; Overquantifying Security Risk; Tendency to Use the Rubric of All-hazard Risk; A Propensity to Minimize the Element of Threat in Performing Security Risk Assessments; CHAPTER 5 A Critique of Current Maritime Security Measures and Approaches; Introduction; Regulations and Their Limits; The ISPS Code; Supply Chain Security; International Organization for Standardization.

Sets forth practices to ensure security and foster international trade Written with an international perspective, this book analyzes the complex set of factors affecting the security of port and maritime operations, including shipping, politics, economics, crime, and terrorism. Author Michael Edgerton critiques current approaches to maritime and port security based on his more than twenty-five years of experience in the field. He not only points out vulnerabilities in today's practices, but also provides a set of proven and tested recommendations that recognize the role and int.

Print version record.

Includes bibliographical references and index.

There are no comments on this title.

to post a comment.

Khulna University of Engineering & Technology

Funded by: HEQEP, UGC, Bangladesh