Abstract
Following the outlining of a broad definition for economic security this chapter focuses on the trend of increasingly interdependent, complex economic systems and how they can be navigated. A framework is established where the risks related to economic security it can be approximated as interdependent net works vulnerable to cascading failures. Scaling networks have characteristics that allow for a node-focused approach to security where the hubs of the network can represent the major units or hubs in the system, and to demonstrate the effectiveness of this perspective in economic security a case study is provided. The case of Lloyd’s of London and its intervention in the Malacca Strait will show how private actors who appreciate the criticality of node-based concepts in economic systems can apply such knowledge to their benefit. The effects of localized catastrophes on corporate markets are discussed to demonstrate the link between macro and micro-economic nodes as well as how to identify economic nodes. The framework established and demonstrated will be useful for the decision making processes of experts in the field.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Lloyds of London is a historic nexus of specialised insurance (a financial product that reimburses clients financially for certain potential losses) underwriters, brokers and experts that together form on world insurance market that still dominates specialised and large risks in particular, including maritime insurance (Weitz 2008).
References
Branch D, Wood EJ (2010) Revisiting counterinsurgency. Politics Soc 38(1):3–14
Control Global (2014) The rocky relationship between safety and security. Retrieved from http://www.controlglobal.com/whitepapers/2014/rocky-relationship-between-safety-and-security/
Deutch J, Schlesinger JR, Victor DG (2006) National security consequences of US oil dependency. COUNCIL ON FOREIGN RELATIONS NEW YORK
Greenhill KM, Staniland P (2007) Ten ways to lose at counterinsurgency. Civil Wars 9(4):402–419
Knight RF, Pretty DJ (1996) The impact of catastrophes on shareholder value. Templeton College
Lewis TG (2014) Critical infrastructure protection in homeland security: defending a networked nation. Wiley, London
Lobo-Guerrero L (2010) Insuring security: biopolitics, security and risk. Routledge, London
Lobo-Guerrero L (2012a) Insuring war: sovereignty, security and risk. Routledge, London
Lobo-Guerrero L (2012b) Lloyd’s and the Moral Economy of Insuring Against Piracy: Towards a politicisation of marine war risks insurance. J Cult Econ 5(1):67–83
McDougall A, Radvanovsky R (2008) Transportation systems security. CRC Press, Boca Raton, FL
Pierides D (2014) Political economies of security for some time to come. J Cult Econ 7(3):371–377
Qu X, Meng Q (2012) The economic importance of the Straits of Malacca and Singapore: an extreme-scenario analysis. Transp Res Part E: Logistics Transp Rev 48(1):258–265
Reinhart CM, Rogoff K (2009) This time is different: eight centuries of financial folly. Princeton University Press, Princeton, NJ
Rodrigue JP (2004) Straits, passages and chokepoints: a maritime geostrategy of petroleum distribution. Cahiers de géographie du Quebec 48(135):357–374
Shelley L (2004) Unholy trinity: transnational crime, corruption, and terrorism, The. Brown J World Aff 11:101
Weitz GR (2008) Lloyd’s of London as a transnational actor: Maritime security cooperation in the Malacca Straits since 9/11. Fletcher School of law and Diplomacy (Tufts University)
Werb D, Rowell G, Guyatt G, Kerr T, Montaner J, Wood E (2011) Effect of drug law enforcement on drug market violence: A systematic review. Int J Drug Policy 22(2):87–94
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Valdron, T. (2016). Economic Security: An Analysis of the Strait of Malacca. In: Masys, A. (eds) Exploring the Security Landscape: Non-Traditional Security Challenges. Advanced Sciences and Technologies for Security Applications. Springer, Cham. https://doi.org/10.1007/978-3-319-27914-5_8
Download citation
DOI: https://doi.org/10.1007/978-3-319-27914-5_8
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-27913-8
Online ISBN: 978-3-319-27914-5
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)