Advertisement

Introduction

  • Xufan ZhangEmail author
  • Michael Roe
Chapter

Abstract

The 9/11 events in 2001 caused worldwide concern about global safety and security. World commerce depends heavily on maritime transport, so its security has attracted great attention. Several major international organisations reacted swiftly to enhance maritime transport safety by strengthening security measures. They produced both voluntary and compulsory rules and programmes, which have been implemented internationally. This chapter introduces consideration of the security of the transfer of non-bulk cargoes within standardised containers. The container shipping system is efficient and economical, but also highly vulnerable to illegal intrusion and misuse. Weapons of mass destruction (WMD), illegal goods and human trafficking can be concealed within containers by terrorists and criminals. Vessels themselves can be used as a weapon in a terrorist attack. In addition, terrorists can operate vessels to finance and support their logistics operations. Within this chapter, the initial concerns facing the industry are outlined along with the structure of the chapters to follow.

References

  1. Babione, R., Kim, C. K., Phone, E., & Sanjaya, E. (2003). Post 9/11 Security Cost Impact on Port of Seattle Import/Export Container Traffic (Working Paper GTTL 502). The University of Washington.Google Scholar
  2. Bennathan, E., & Walters, A. A. (1979). Port Pricing and Investment Policy for Developing Countries. Oxford: Oxford University Press.Google Scholar
  3. Bennett, A. C., & Chin, Y. Z. (2008). 100% Container Scanning: Security Policy Implications for Global Supply Chains (Master of Science Dissertation). Massachusetts Institute of Technology.Google Scholar
  4. Bichou, K. (2008). Security and Risk-Based Models in Shipping and Ports: Review and Critical Analysis, in ITF, Terrorism and International Transport: Towards Risk-Based Security Policy. Paris: OECD Publishing.Google Scholar
  5. Bichou, K. (2011). Assessing the impact of procedural security on container port efficiency. Maritime Economics and Logistics, 13(1), 1–28.CrossRefGoogle Scholar
  6. Bichou, K., & Evans, A. (2007). Maritime security and regulatory risk-based models: Review and critical analysis. In K. Bichou, M. G. H. Bell, & A. Evans (Eds.), Risk Management in Port Operations, Logistics and Supply Chain Security (pp. 265–280). London: Informa.Google Scholar
  7. Bichou, K., & Gray, R. (2005). A critical review of conventional terminology for classifying seaports. Transportation Research A, 39, 75–92.Google Scholar
  8. Brooks, M. (1984). An alternative theoretical approach to the evaluation of liner shipping—Part 1: Situational factors. Maritime Policy and Management, 11(1), 35–43.CrossRefGoogle Scholar
  9. Brooks, M. (1985). An alternative theoretical approach to the evaluation of liner shipping—Part 2: Choice criteria. Maritime Policy and Management, 12(2), 145–155.CrossRefGoogle Scholar
  10. Clayton, M. J. (1997). Delphi: A technique to harness expert opinion for critical decision-making tasks in education. Educational Psychology: An International Journal of Experimental Educational Psychology, 17(4), 373–386.CrossRefGoogle Scholar
  11. Cottam, H. (2012). An Analysis of Eastern European Liner Shipping During the Period of Transition (PhD thesis). Plymouth University, UK.Google Scholar
  12. Crutch, M. (2006). The Benefits of Investing in Global Supply Chain Security: Executive Summary from the DVDR 2006 Roundtable Meeting. Lehigh University Centre for Value Chain Research.Google Scholar
  13. Dekker, S., & Stevens, H. (2007). Maritime security in the European Union-empirical findings on financial implications for port facilities. Maritime Policy and Management, 34(5), 458–499.CrossRefGoogle Scholar
  14. De Meyrick, J. (2003). The Delphi method and health research. Health Education, 103, 7–16.CrossRefGoogle Scholar
  15. Donner, M., & Kruk, C. (2009). Supply Chain Security Guide (pp. 1–107). The World Bank/DFID. Available at http://siteresources.worldbank.org/INTPRAL/Resources/SCS_Guide_Final.pdf. Accessed 20 April 2016.
  16. Gutiérrez, X., Hintsa, J., Wieser, P., & Hameri, A. P. (2007). Voluntary supply chain security program impacts: An empirical study with BASC member companies. World Customs Journal, 1(2), 31–48.Google Scholar
  17. Haezendonck, E., & Notteboom, T. (2002). The competitive advantage of seaports. In M. Huybrechts, et al. (Eds.), Port Competitiveness: An Economic and Legal Analysis of the Factors Determining the Competitiveness of Seaports (pp. 67–87). Antwerp: De Boeck.Google Scholar
  18. Håvold, J. I. (2005). Safety-culture in Norwegian shipping company. Journal of Safety Research, 36(5), 441–458.CrossRefGoogle Scholar
  19. Hsu, C. C., & Sandford, B. A. (2007). The Delphi technique: Making sense of consensus. Practical Assessment Research and Evaluation, 12(10), 2.Google Scholar
  20. Iqbal, S., & Pipon-Young, L. (2009). The Delphi method. Psychologist, 22(7), 598–601.Google Scholar
  21. Jeon, I.-S., Kim, H.-S., & Kim, B.-J. (1993). Strategy for Improvement of Competitive Power in Korea Container Port. Seoul: Korea Maritime Institute.Google Scholar
  22. Kruk, C., & Donner, M. (2008). Review of Cost of Compliance with the New International Freight Transport Security Requirements. Washington, DC: The World Bank.Google Scholar
  23. Lee, H. L., & Whang, S. (2005). Higher supply chain security with lower cost: Lessons from total quality management. International Journal of Production Economies, 96(3), 289–300.CrossRefGoogle Scholar
  24. Lirn, T. C., Thanopoulou, H. A., & Beresford, A. K. C. (2003). Transhipment port selection and decision-making behaviour: Analysing the Taiwanese case. International Journal of Logistics: Research and Applications, 6(4), 229–244.CrossRefGoogle Scholar
  25. Lun, Y. H. V., Wong, C. W. Y., Lai, K. H., & Cheng, T. C. E. (2008). Institutional perspective on the adoption of technology for the security enhancement of container transport. Transport Reviews, 28(1), 21–33.CrossRefGoogle Scholar
  26. Malchow, M., & Kanafani, A. (2001). A disaggregate analysis of factors influencing port selection. Maritime Policy and Management, 28(3), 265–277.CrossRefGoogle Scholar
  27. Malchow, M. B., & Kanafani, A. (2004). A disaggregate analysis of port selection. Transportation Research Part E, 40, 317–337.CrossRefGoogle Scholar
  28. McCalla, R. (1994). Canadian container: How have they fared? How will they do? Maritime Policy and Management, 21(3), 207–217.Google Scholar
  29. Miller, J. (2007, October 25). New Shipping Law Makes Big Waves in Foreign Ports. Wall Street Journal.Google Scholar
  30. Murphy, P. R., & Daley, J. M. (1994). A framework for applying logistical segmentation. International Journal of Physical Distribution and Logistics Management, 24(10), 13–19.CrossRefGoogle Scholar
  31. Murphy, P., Dalenberg, D., & Daley, J. (1988). A contemporary perspective on international port operations. Transportation Journal, 28(1), 23–32.CrossRefGoogle Scholar
  32. Murphy, P., Dalenberg, D., & Daley, J. (1989). Assessing international port operations. International Journal of Physical Distribution and Materials Management, 19(9), 3–10.CrossRefGoogle Scholar
  33. Murphy, P., Dalenberg, D., & Daley, J. (1991). Analysing international water transportation: The perspectives of large U.S. industrial corporations. Journal of Business Logistics, 12(1), 169–190.Google Scholar
  34. Notteboom, T., & Yap, W. Y. (2012). Port competition and competitiveness. In W. Talley (Ed.), The Blackwell Companion to Maritime Economics (pp. 549–570). Malden: Blackwell.CrossRefGoogle Scholar
  35. OECD. (2003). Maritime Transport Committee Security in Maritime Transport: Risk Factors and Economic Impact. Available at https://www.oecd.org/newsroom/4375896.pdf.
  36. Parliament of Australia. (2003). The US Container Security Initiative and Its Implications for Australia. Available at http://www.aph.gov.au/About_Parliament/Parliamentary_Departments/Parliamentary_Library/Publications_Archive/CIB/cib0203/03cib27.
  37. Parola, F., Risitano, M., Ferretti, M., & Panetti, E. (2017). The drivers of port competitiveness: A critical review. Transport Reviews, 37(1), 116–138.CrossRefGoogle Scholar
  38. Pearson, R. (1980). Containerline Performance and Service Quality. Liverpool, UK: University of Liverpool.Google Scholar
  39. Peters, H. J. (1990). Structural Changes in International Trade and Transport Markets: The Importance of Markets. The 2nd KMI International Symposium, Seoul.Google Scholar
  40. Rabadi, G., PintoI, C. A., Talley, W., & Arnaout, J. P. (2007). Port recovery from security incidents: A simulation approach. In K. Bichou, M. Bell, & A. Evans (Eds.), Risk Management in Port Operations, Logistics and Supply Chain Security (pp. 83–94). London: Informa.Google Scholar
  41. Roach, A. (2004). Initiatives to enhance maritime security at sea. Marine Policy, 28(1), 41–66.CrossRefGoogle Scholar
  42. Rowe, G., Wright, G., & McColl, A. (2005). Judgment change during Delphi-like procedures: The role of majority influence, expertise and confidence. Technological Forecasting and Social Change, 72, 377–399.CrossRefGoogle Scholar
  43. Slack, B. (1985). Containerisation inter-port competition and port selection. Maritime Policy and Management, 12(4), 293–303.CrossRefGoogle Scholar
  44. Talas, R., & Menachof, D. (2009). The efficient tradeoff between security and cost for seaports: A conceptual model. International Journal of Risk Assessment and Management, 13(1), 46–59.CrossRefGoogle Scholar
  45. Thai, V. V. (2007). Impacts of security improvements on service quality in maritime transport: An empirical study of Vietnam. Maritime Economics and Logistics, 9(4), 335–356.CrossRefGoogle Scholar
  46. Timlen, T. (2007, April/May). The ISPS Code: Where are we now? Cargo Security International, 5(3), 14–15.Google Scholar
  47. UNCTAD. (1992). Port Marketing and the Challenge of the Third Generation Port (pp. 358–361). Geneva.Google Scholar
  48. UNCTAD. (2004, February 26). Container Security: Major Initiatives and Related International Developments. Report by the UCTAD Secretariat, Geneva.Google Scholar
  49. UNCTAD. (2007). Maritime Security: ISPS Code Implementation, Costs and Related Financing UNCTAD/SDTE/TLB/2007. Available at http://unctad.org/en/Docs/sdtetlb20071_en.pdf.
  50. Urciuoli, L., Sternberg, H., & Ekwall, D. (2010, July 11–15). The Effects of Security on Transport Performances. Paper Presented at the 12th World Conference on Transport Research, Lisbon, Portugal.Google Scholar
  51. Voss, M., Whipple, J., & Closs, D. (2009). The role of strategic security: Internal and external security measures with security performance implications. Transportation Journal, 48(2), 5–23.Google Scholar
  52. Willingale, M. (1981). The port routing behaviour of short sea ship operator theory and practices. Maritime Policy and Management, 8(2), 109–120.CrossRefGoogle Scholar
  53. Yang, Y. C. (2010). Impact of the container security initiative on Taiwan’s shipping industry. Maritime Policy and Management, 37(7), 699–722.CrossRefGoogle Scholar
  54. Yeo, G. T. (2007). Port Competitiveness in North East Asia: An Integrated Fuzzy Approach to Expert Evaluations (PhD thesis). Plymouth University, UK.Google Scholar

Copyright information

© The Author(s) 2019

Authors and Affiliations

  1. 1.Department of LogisticsBeijing WuZi UniversityBeijingChina
  2. 2.Graduate School of ManagementPlymouth UniversityPlymouthUK

Personalised recommendations