Skip to main content

The Issue of Deploying Technology

  • Chapter
  • First Online:
Contemporary Container Security

Part of the book series: Palgrave Studies in Maritime Economics ((PSME))

  • 272 Accesses

Abstract

This chapter considers maritime security as it appears at headquarters, considering how container security relates to the national security calculus, and how it is (not) pursued by the responsible state agencies in different national contexts with an emphasis on how to methodologically deploy technology to reduce associated risks. In this context, it proposes the CRAVE (costs, risks, and values evaluation) framework for GTD decisions, including supply chain security. It discusses the role of technology in container security and illustrates the characteristics of container security strategic decisions. Also, it explains the CRAVE framework, including how it can be used to make good decisions in container security.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 59.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 79.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Bernhard, C. (2009). Public private dialogue in security research. Directorate General Internal Policies of the Union, Policy Department C.

    Google Scholar 

  • Burgess, J. P. (2008). Security as Ethics. Oslo, Norway: International Peace Research Institute.

    Google Scholar 

  • Buzan, B., Waever, O., & de Wilde, J. (1998). Security: A New Framework for Analysis. London: Lynne Rienner.

    Google Scholar 

  • Doyle, M. W. (1997). Ways of War and Peace: Realism, Liberalism and Socialism. New York, NY: W.W. Norton.

    Google Scholar 

  • Eriksson, J. (2001). Threat Politics: New Perspectives on Security, Risk and Crisis Management. Aldershot: Ashgate.

    Google Scholar 

  • Henisz, W. J., Mansfield, E. D., & von Glinow, M. A. (2010). Conflict, security and political risk: International business in changing times. Journal of International Business Studies, 41, 759–764.

    Article  Google Scholar 

  • Holmes, C. (2012). Supply chains at an inflexion point—Will the use of new technologies offset increasing costs in the Asia Pacific region? Supply Chain Council.

    Google Scholar 

  • Joglekar, P., & Toraskar, K. (1994, January). Costs, risks and values evaluation: A methodology for global technology deployment decisions. In Proceedings of the Goldring Institute Symposium on Global Technology, Tulane University, New Orleans, LA.

    Google Scholar 

  • Kaplan, R. (1986). Must CIM is justified by faith alone? Harvard Business Review, 64(2), 87–95.

    Google Scholar 

  • Mansfield, E. D., & Pollins, B. M. (2003). Economic Interdependence and International Conflict: New Perspectives on an Enduring Debate. Ann Arbor, MI: University of Michigan Press.

    Book  Google Scholar 

  • McCormack, K., Wilkerson, T., Marrow, D., Davey, M., Shah, M., & Yee, D. (2008). Managing risk in your organization with the SCOR methodology. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.668.3730&rep=rep1&type=pdf

  • McFarland, R. G., Bloodgood, J. M., & Payan, J. M. (2008). Supply chain contagion. Journal of Marketing, 72(2), 78–91.

    Article  Google Scholar 

  • Naslund, D., & Williamson, S. (2010). What is management in supply chain management? A critical review of definitions, frameworks and terminology. Journal of Management Policy and Practice, 11(4), 231–252.

    Google Scholar 

  • OECD. (2004). Container Transport Security across Modes. Paris: OECD.

    Google Scholar 

  • Rothenberg, J. (1975). Cost-benefit analysis: A methodological exposition. In H. Guttentag & E. Struening (Eds.), Handbook of Evaluation Research (Vol. 2). Beverly Hills, CA: Sage.

    Google Scholar 

  • Stein, A. A. (1993). Governments, economic interdependence, and international cooperation. In P. E. Tetlock, J. L. Husbands, R. Jervis, P. C. Stern, & C. Tilly (Eds.), Behaviour, Society and Nuclear War (pp. 241–324). Oxford: Oxford University Press.

    Google Scholar 

  • Thai, V. (2009). Effective maritime security: Conceptual model and empirical evidence. Maritime Policy & Management, 36(2), 147–163.

    Article  Google Scholar 

  • Vanany, I., Zailani, S., & Pujawan, N. (2009). Supply chain risk management: Literature review and future research. International Journal of Information Systems and Supply Chain Management, 2(1), 16–33.

    Article  Google Scholar 

  • van der Linden, J. A. (2001). The economic impact study of maritime policy issues: Application to the German case. Maritime Policy & Management, 28(1), 33–54.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Gujar, G., Ng, A.K.Y., Yang, Z. (2018). The Issue of Deploying Technology. In: Contemporary Container Security. Palgrave Studies in Maritime Economics. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-98134-5_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-98134-5_8

  • Published:

  • Publisher Name: Palgrave Macmillan, Cham

  • Print ISBN: 978-3-319-98133-8

  • Online ISBN: 978-3-319-98134-5

  • eBook Packages: Economics and FinanceEconomics and Finance (R0)

Publish with us

Policies and ethics