Skip to main content

Creating an Analytical Framework: Maritime Security, Risk and Vulnerability

  • Chapter
  • First Online:
Maritime Security Risks, Vulnerabilities and Cooperation

Part of the book series: New Security Challenges ((NSECH))

  • 623 Accesses

Abstract

Traditional and contemporary concepts of maritime security are explored, along with concepts of risk and vulnerability, as they apply to strategic analysis. A brief epistemological scan supports the development of a conceptual basis for understanding the nexus between security, risk and vulnerability. The emerging convergence between security and risk, as normative concepts, is identified. Theoretical constructs are drawn together to develop a composite framework with practical applications for complex international security contexts. A universal definition of maritime security is proposed that includes traditional and non-traditional security challenges and encompasses notions of risk and vulnerability. Common theoretical bases and workable definitions likely to be acceptable to the majority of actors are necessary precursors to practical collective and cooperative maritime security advancement in the Indian Ocean.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 159.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    The term ‘securitization’ was originally coined by the ‘Copenhagen School’ of security studies, a group of scholars who were variously associated with the Copenhagen Peace Research Institute circa 1983, and after that included Barry Buzan, Ole Wæver and Jaap de Wilde as prominent members.

  2. 2.

    Critical security studies are often associated with ‘the Frankfurt School’s Critical Theory’. The ‘Frankfurt School’ is a term used to describe what originally started as the Institute for Social Research, set up by a group of neo-Marxist intellectuals in Germany in 1923, affiliated to Goethe University in Frankfurt and independently of the Communist Party, which has been influential in the development of Marxist theory ever since.

  3. 3.

    Mainly naval forces but also involving air and land forces, and abilities to command, control, communicate and the effectiveness of surveillance, reconnaissance and intelligence, along with cyber and space.

  4. 4.

    For example, merchant and fishing fleets, port infrastructure, ship building and repair industries.

  5. 5.

    For example, the International Maritime Organization—IMO.

  6. 6.

    For example, the Regional Cooperation Agreement on Combating Piracy and Armed Robbery against Ships in Asia (ReCAAP) and the Code of Conduct concerning the Repression of Piracy and Armed Robbery against Ships in the Western Indian Ocean and the Gulf of Aden (Djibouti Code of Conduct).

  7. 7.

    In 2004, Kofi Anan, Secretary General of the United Nations, provided a statement that typified collective security challenges and concerns. In his letter to the UN General Assembly (UNGA) in launching a report from his specially appointed ‘High-level Panel on Threats, Challenges and Change’, he stated, “I argued that we faced a decisive moment for the United Nations – and in particular for the aspiration set out in the Charter to provide collective security for all. I drew attention to deep divisions among the Member States on the nature of the threats that we faced and the appropriateness of the use of force to address those threats … The report offers the United Nations a unique opportunity to refashion and renew our institutions. I wholly endorse its core arguments for a broader, more comprehensive concept of collective security: one that tackles new and old threats and addresses the security concerns of all States – rich and poor, weak and strong. The Panel’s insistence that we must see the interconnectedness of contemporary threats to our security is particularly important … As the Panel rightly says, our principal focus should be on preventing threats from emerging. But should such threats emerge, we must be better prepared to respond.”

  8. 8.

    Gareth Evans argued: “The virtue, and utility, of the expression ‘cooperative security’ is that the language itself encourages an open and constructive mindset, one less likely to be inhibited by familiar disciplinary boundaries and traditional state-centered security thinking. The term tends to connote consultation rather than confrontation, reassurance rather than deterrence, transparency rather than secrecy, prevention rather than correction, and interdependence rather than unilateralism.”

  9. 9.

    Sea control is defined as that condition which exists when one has freedom of action to use an area of sea for one’s own purposes for a period of time and, if required, to deny its use to an opponent.

  10. 10.

    Sea assertion involves asserting control or dominance of an area of sea for a period of time.

  11. 11.

    Sea denial is defined as that condition which exists when an adversary is denied the ability to use an area of sea for his own purposes for a period of time.

  12. 12.

    Maritime power projection involves the delivery of force from the sea and can take the form of amphibious or Special Forces landings or the delivery of bombardment, guided or unguided weapons, and military aircraft from seaborne platforms.

  13. 13.

    The inaugural ASEAN Regional Forum (ARF) meeting on 25 July 1994 directed that comprehensive security be studied, and at its second meeting on 1 August 1995, the notion of “comprehensive security” was specifically referred to. The Chairman’s statement noted: “[T]he ARF recognises that the concept of comprehensive security includes not only military aspects but also political, economic, social and other issues.”

  14. 14.

    Threats such as civil war, transnational crime, terrorism, infectious diseases, and the proliferation of small arms are now included. To this could be added piracy; illegal immigration; trafficking of drugs, weapons and people; illegal, unreported and unregulated fishing; and marine resource exploitation and pollution.

  15. 15.

    Non-governmental organizations (NGOs), private security companies and international regimes are now providers of security in some contexts.

  16. 16.

    Sam Bateman provided the following statement about defining maritime security to the 2nd ARF Inter-Sessional Meeting on Maritime Security held in Auckland, 29–30 March 2010: “The situation is complicated by the lack of agreement among regional countries both on a definition of maritime security and on the priority to be accorded different threats. Some countries include non-traditional security threats within their definition, but others are uncomfortable with including environmental threats and illegal fishing. The concept of maritime security is now much wider and more diverse than the traditional one of defence against military threats and the protection of national interests and sovereignty at sea. With the notion of comprehensive security, the concept now includes non-traditional security issues, such as piracy, terrorism, natural disasters, climate change, illegal fishing, marine pollution, maritime safety and the smuggling of drugs, arms and people.”

  17. 17.

    The meanings of the words in the definition of risk are explained: “Effect is a deviation from the expected – positive and/or negative”; “Objectives can have different aspects (such as financial, health and safety, and environmental goals) and can apply at different levels (such as strategic, organization-wide, project, product and process)” and “Uncertainty is the state, even partial, of deficiency of information related to, understanding or knowledge of, an event, its consequence, or likelihood”. The definition notes state: “Risk is often characterized by reference to potential events … and consequences or a combination of these” and is “often expressed in terms of a combination of the consequence of an event … and the associated likelihood … of occurrence”. The associated term “risk management” is defined as “coordination activities to direct and control an organization with regard to risk” (ISO 2009, 2).

  18. 18.

    Risk management includes the “overall governance, strategy and planning, management, reporting processes, policies, values and culture” (AS/NZS 2009, iv–v).

  19. 19.

    HB 158-2010 (ISO 2010, 13–19) provides extensive guidance on the implementation of holistic risk management in organizations and expounds upon the practice and benefits of instituting risk controls and risk assurance mechanisms.

  20. 20.

    ISO Guide 73 defines risk tolerance as the “organization’s or stakeholder’s readiness to bear the risk after risk treatment in order to achieve objectives”.

  21. 21.

    ISO Guide 73 defines risk appetite as the “amount and type of risk that an organization is willing to pursue or retain”.

  22. 22.

    HB 158-2010 (ISO 2010, 21–22) asserts that risk management “is fundamental to organizational control and a critical part of providing sound corporate governance. It touches all aspects of … activities … many organizations have moved to adopt Enterprise Risk Management (ERM)”.

  23. 23.

    There are several definitions of enterprise risk management (ERM) in use, with the official international risk management literature offering a US-derived definition (ISO 2010, 6). The (US) Committee of Sponsoring Organizations of the Treadway Commission (COSO) defines ERM as: “A process effected by an entity’s board of directors, management and other personnel, applied in strategy setting and across an enterprise, designed to identify potential events that may affect the entity, and manage risk to be within its risk appetite, to provide reasonable assurance regarding the achievement of entity objectives.” A definition used by the (US) Actuarial Society, Enterprise Risk Management Committee, May 2003, is as follows: “ERM is the discipline by which an organisation in any industry assesses, controls, exploits, finances, and monitors risks from all sources for the purpose of increasing the organization’s short- and long-term value to its stakeholders.” HM Treasury (UK) defines ERM as: “All the processes involved in identifying, assessing and judging risks, assigning ownership, taking actions to mitigate or anticipate them and monitoring and reviewing progress.” Implicit in these ERM definitions is recognition that it presents a strategic decision support framework for management designed to improve the quality of decision-making at all levels of the organization.

  24. 24.

    Political risk assessments are particularly important in forecasting the long-term situation in a specific geopolitical context. The risk identification process is important, as it sets the political risk context. Political risk calculation is invariably a measure of judgement by the analyst and entity leadership. Evaluations of political stability and security, over a 20- to 30-year time frame, in parts of the developing world where, for example, major natural resources are available for exploitation will often be difficult.

  25. 25.

    How risks combine and potentially magnify due to cumulative and/or aggregated factors, which often appear to be discrete and diverse but in fact impact on each other, presents challenges to risk management at national and organizational levels. Evaluations of aggregated and accumulated risk at larger organizational levels that involve complex interactions require access to good data and the application of experienced judgement employing a largely qualitative approach. Effective quantitative assessment of aggregated and accumulated risk in organizations has generally proven elusive. Various approaches, models and technology-driven systems have been tried. The results have been useful for calculating aggregated risk at a tactical level where largely technical, routinized processes are employed. Reasonable confidence in qualitative judgements in assessing aggregated and accumulated risk at the enterprise or organizational level requires sound organizational constructs, good risk and safety management processes, systems and information, and the engagement of suitably experienced and responsible management oversight.

  26. 26.

    Although “vulnerability” is defined as “intrinsic properties of something resulting in susceptibility to a risk source that can lead to an event with consequences” in ISO (2009, 8).

  27. 27.

    Witness the unintended outcomes of the US-led ‘War on Terror’.

References

  • Akaha, Tsuneo. 1991. Japan’s Comprehensive Security Policy: A New East Asian Environment. Asian Survey 31 (4):324–340. http://www.jstor.org/stable/2645387. Accessed 23 May 2013.

  • ASEAN Regional Forum (ARF). 2013. http://aseanregionalforum.asean.org/. Accessed 7 June.

  • Australian Department of Defence. 2000. Australian Maritime Doctrine: RAN Doctrine 1 2000. 1st ed. Canberra: Defence Publishing Service.

    Google Scholar 

  • Australian Government, Department of Defence. 2009. Defending Australia in the Asia Pacific Century: Force 2030. Canberra: Australian Government Publishing Service.

    Google Scholar 

  • ———. 2013. 2013 Defence White Paper. Canberra: Australian Government Publishing Service.

    Google Scholar 

  • Australian/New Zealand Standards (AS/NZS 2009). 2009. Risk Management – Principles and Guidelines, AS/NZS ISO 31000:2009. Sydney: Standards Australia.

    Google Scholar 

  • Baldwin, David A. 1997. The Concept of Security. Review of International Studies 23 (1): 5–26. http://journals.cambridge.org/abstract_S0260210597000053. Accessed 25 Mar 2013.

  • Ball, Desmond. 2011. Asia’s Naval Arms Race: Myth or Reality? Paper Prepared for the 25th Asia-Pacific Roundtable, Kuala Lumpur, Malaysia, May 29–June 1. http://www.isis.org.my/files/25APR/paper_cs_2_desmond_ball.pdf. Accessed 10 Sept 2012.

  • Balzacq, Thierry, ed. 2011. Securitization Theory: How Security Problems Emerge and Dissolve. London/New York: Routledge.

    Google Scholar 

  • Bateman, Sam. 2011. Solving the “Wicked Problems” of Maritime Security: Are Regional Forums up to the Task? Contemporary Southeast Asia 33 (1): 1–28.

    Article  Google Scholar 

  • Bateman, Sam, Joshua Ho, and Jane Chan. 2009. Good Order at Sea. RSIS Policy Paper. Singapore: Nanyang Technological University.

    Google Scholar 

  • Beck, Ulrich. 1992. Risk Society: Towards a New Modernity. London: Sage.

    Google Scholar 

  • ———. 1999. World Risk Society. Cambridge: Polity Press.

    Google Scholar 

  • ———. 2009a. Critical Theory of World Risk Society: A Cosmopolitan Vision. Constellations 16 (1): 3–22.

    Article  Google Scholar 

  • ———. 2009b. World Risk Society and Manufactured Uncertainties. Iris: European Journal of Philosophy and Public Debate 1 (2): 291–299.

    Google Scholar 

  • Booth, Ken. 1997. Security and Self: Reflections of a Fallen Realist. In Critical Security Studies: Concepts and Cases, ed. Keith Krause and Michael C. Williams, 83–119. Minneapolis: University of Minnesota Press.

    Google Scholar 

  • Brauch, Hans Günter. 2011. Concepts of Security Threats, Challenges, Vulnerabilities and Risks. In Coping with Global Environmental Change, Disasters and Security: Threats, Challenges, Vulnerabilities and Risks, ed. Hans Günter Brauch, Úrsula Oswald Spring, Czeslaw Mesjasz, John Grin, Patricia Kameri-Mbote, Béchir Chourou, Pál Dunay, and Jörn Birkmann, 61–106. Berlin/Heidelberg: Springer.

    Chapter  Google Scholar 

  • Brauch, Hans Günter, and Úrsula Oswald Spring. 2011. Introduction: Coping with Global Environmental Change in the Anthropocene. In Coping with Global Environmental Change, Disasters and Security: Threats, Challenges, Vulnerabilities and Risks, ed. Hans Günter Brauch, Úrsula Oswald Spring, Czeslaw Mesjasz, John Grin, Patricia Kameri-Mbote, Béchir Chourou, Pál Dunay, and Jörn Birkmann, 31–60. Berlin/Heidelberg: Springer.

    Chapter  Google Scholar 

  • Brooks, Nick, W. Neil Adger, and P. Mick Kelly. 2005. The Determinants of Vulnerability and Adaptive Capacity at the National Level and the Implications for Adaptation. Global Environmental Change 15: 151–163.

    Article  Google Scholar 

  • Burke, Anthony. 2012. Security. In An Introduction to International Relations, ed. Richard Devetak, Anthony Burke, and Jim George, 2nd ed., 160–171. New York: Cambridge University Press.

    Google Scholar 

  • China, People’s Republic. 2013. The Diversified Employment of China’s Armed Forces. Beijing: Information Office of the State Council.

    Google Scholar 

  • Corbett, Julian. 1911. Some Principles of Maritime Strategy. London: Longmans, Green and Co..

    Google Scholar 

  • Council for Security Cooperation in the Asia-Pacific (CSCAP). 1996. The Concepts of Comprehensive Security and Cooperative Security. CSCAP Memorandum No. 3. http://www.cscap.org/. Accessed 23 May 2013.

  • Craig, Gordon A., and Felix Gilbert. 1986. Reflections on Strategy in the Present and Future. In Makers of Modern Strategy: From Machiavelli to the Nuclear Age, ed. Peter Paret, 863–871. Princeton: Princeton University Press.

    Google Scholar 

  • Dalby, Simon. 1997. Contesting an Essential Concept: Reading the Dilemmas in Contemporary Security Discourse. In Critical Security Studies: Concepts and Cases, ed. Keith Krause and Michael C. Williams, 3–31. Minneapolis: University of Minnesota Press.

    Google Scholar 

  • Elahi, Golnaz, Eric Yu, and Nicola Zannone. 2011. Security Risk Management by Qualitative Vulnerability Analysis. Paper Presented at the Third International Workshop on Security Measurements and Metrics, Banff. http://ieeexplore.ieee.org.proxy.library.adelaide.edu.au/stamp/stamp.jsp?tp=&arnumber=6165757. Accessed 2 Jan 2013.

  • Evans, Gareth. 1994. Cooperative Security and Intrastate Conflict. Foreign Policy 96: 3–21.

    Article  Google Scholar 

  • Gaddis, John Lewis. 1982. Strategies of Containment: A Critical Appraisal of Postwar American National Security Policy. Oxford: Oxford University Press.

    Google Scholar 

  • Hertz, John H. 1950. Idealist Internationalism and the Security Dilemma. World Politics 2 (2): 171–201.

    Google Scholar 

  • Hsiung, James C. 2004. Comprehensive Security: Challenge for Pacific Asia. New York: University of Indianapolis Press.

    Google Scholar 

  • Intergovernmental Panel on Climate Change (IPCC). 2007. Climate Change 2007: Impacts, Adaptation and Vulnerability. Contribution of Working Group II to the Fourth Assessment Report of the Intergovernmental Panel on Climate Change, ed. Martin Parry, Osvaldo Canziani, Jean Palutikof, Paul van der Linden, and Clair Hanson. Cambridge UK: Cambridge University Press. http://www.ipcc.ch/publications_and_data/publications_ipcc_fourth_assessment_report_wg2_report_impacts_adaptation_and_vulnerability.htm. Accessed 27 Aug 2013.

  • ———. 2014. Climate Change 2014: Impacts, Adaptation, and Vulnerability: Summary for Policymakers. IPCC WGII AR5 Summary for Policymakers WGII AR5 Phase I Report Launch 1, 31 March 2014. http://ipcc-wg2.gov/AR5/images/uploads/IPCC_WG2AR5_SPM_Approved.pdf. Accessed 6 Apr 2014.

  • International Organization for Standardization (ISO). 2009. ISO Guide 73: Risk Management – Vocabulary. 1st ed. Geneva: International Organization for Standardization.

    Google Scholar 

  • ———. 2010. HB 158–2010: Handbook – Delivering Assurance Based on ISO 31000:2009 Risk management – Principles and Guidelines. 2nd ed. Sydney: International Organization for Standardization.

    Google Scholar 

  • Jayasuriya, Kanushka. 2009. Comprehensive Security, the Post Cold War and the Transformation of the State. In Comprehensive Security in the Asia-Pacific Region, ed. Hari Singh and Colin Dürkop, 15–33. Germany: Konrad Adenauer Stiftung.

    Google Scholar 

  • Jervis, Robert. 1976. Perception and Misperception in International Politics. Princeton: Princeton University Press.

    Google Scholar 

  • ———. 1978. Cooperation Under the Security Dilemma. World Politics 30 (2): 167–174.

    Article  Google Scholar 

  • Kaplan, Robert D. 2010. Monsoon: The Indian Ocean and the Battle for Supremacy in the 21st Century. Collingwood: Black Inc..

    Google Scholar 

  • Krahmann, Elke, ed. 2005. New Threats and New Actors in International Security. New York: Palgrave Macmillan.

    Google Scholar 

  • Krause, Keith, and Michael C. Williams, eds. 1997. Critical Security Studies: Concepts and Cases. Minneapolis: University of Minnesota Press.

    Google Scholar 

  • Latour, Bruno. 2003. Is Re-modernization Occurring – And If So, How to Prove It?: A Commentary on Ulrich Beck. Theory, Culture & Society 20 (2): 35–48.

    Article  Google Scholar 

  • League of Nations. 1919. The Covenant of the League of Nations. Entered Into Force January 10, 1920, Paris.

    Google Scholar 

  • Lipschutz, Ronnie D., ed. 1995. On Security. New York: Columbia University Press.

    Google Scholar 

  • Lobo-Guerrero, Luis. 2010. The International Political Sociology of Risk. The International Studies Encyclopedia 7: 4418–4436.

    Google Scholar 

  • ———. 2011. Insuring Security: Biopolitics, Security and Risk. Abingdon/Oxon/New York: Routledge.

    Google Scholar 

  • Mahan, Alfred Thayer. 1890. The Influence of Sea Power Upon History: 1660–1783. New York: Hill and Wang.

    Google Scholar 

  • McCarthy, Margot. 2012. Whole of Government Protective Security Outlook. Paper Presented at the Security in Government Conference, Canberra, September 4. http://www.dpmc.gov.au/national_security/speeches/2012-09-04_WoG_protective_security_outlook.pdf. Accessed 11 Apr 2013.

  • Mesjasz, Czeslaw. 2011. Economic Vulnerability and Economic Security. In Coping with Global Environmental Change, Disasters and Security: Threats, Challenges, Vulnerabilities and Risks, ed. Hans Günter Brauch, Úrsula Oswald Spring, Czeslaw Mesjasz, John Grin, Patricia Kameri-Mbote, Béchir Chourou, Pál Dunay, and Jörn Birkmann, 123–156. Berlin/Heidelberg: Springer.

    Chapter  Google Scholar 

  • Mohan, C. Raja. 2012. Samudra Manthan: Sino-Indian Rivalry in the Indo-Pacific. Washington, DC: Carnegie Endowment.

    Google Scholar 

  • Mythen, Gabe. 2004. Ulrich Beck: A Critical Introduction to the Risk Society. London/Sterling: Pluto Press.

    Google Scholar 

  • Navy, Indian. 2007. Freedom to Use the Seas: India’s Maritime Military Strategy. Integrated Headquarters Ministry of Defence (Navy): New Delhi.

    Google Scholar 

  • Palme, Olof. 1982. Common Security: A Programme for Disarmament. The Report of the Independent Commission on Disarmament and Security Issues. London: Pan Books.

    Google Scholar 

  • Petersen, Karen Lund. 2011. Risk Analysis – A Field Within Security Studies? European Journal of International Relations 18 (4): 693–717.

    Article  Google Scholar 

  • Rahman, Chris. 2009. Concepts of Maritime Security: A Strategic Perspective on Alternative Visions for Good Order and Security at Sea, with Policy Implications for New Zealand. Discussion Paper 07/09, Centre for Strategic Studies, Victoria University of Wellington.

    Google Scholar 

  • Rolfe, Jim. 2008. Regional Security for the Asia-Pacific: Ends and Means. Contemporary Southeast Asia: A Journal of International & Strategic Affairs 30 (1): 99–117.

    Article  Google Scholar 

  • Rourke, John T. 1993. International Politics on the World Stage. 4th ed. Guilford: The Dushkin Publishing Group.

    Google Scholar 

  • Shergold, Peter. 2004. Connecting Government: Whole of Government Responses to Australia’s Priority Challenges. Canberra: Commonwealth of Australia. http://www.apsc.gov.au/__data/assets/pdf_file/0006/7575/connectinggovernment.pdf. Accessed 14 Apr 2013.

  • Stockholm International Peace Research Institute (SIPRI). 2012. Background Paper on SIPRI Military Expenditure Data, 2011. http://www.sipri.org/research/armaments/milex. Accessed 10 Sept.

  • Sun Tzu. 2005 (~512 BC). The Art of War: Sun Tzu. Trans. C. Thomas. Boston/London: Shambhala.

    Google Scholar 

  • Till, Geoffrey. 1984. Maritime Strategy and the Nuclear Age. 2nd ed. London/Basingstoke: Macmillan Press.

    Google Scholar 

  • ———. 1994. Seapower: Theory and Practice. Essex: Frank Cass.

    Google Scholar 

  • ———. 2013. Seapower: A Guide for the Twenty-First Century. 3rd ed. London/New York: Routledge.

    Google Scholar 

  • United Nations. 1945. Charter of the United Nations. Entered Into Force October 24, 1945, San Francisco.

    Google Scholar 

  • ———. 1983. The United Nations Convention on the Law of the Sea (UNCLOS). New York: United Nations.

    Google Scholar 

  • United Nations General Assembly (UNGA). 2004. Follow-Up to the Outcome of the Millennium Summit. Note by the Secretary-General, A/59/565, December 2, Fifty-Ninth Session, Agenda Item 55.

    Google Scholar 

  • United States Government, Department of Defense. 2010. Quadrennial Defense Review Report. http://www.defense.gov/qdr/images/QDR_as_of_12Feb10_1000.pdf. Accessed 17 July 2013.

  • United States Navy, United States Marine Corps and United States Coast Guard. 2007. A Cooperative Strategy for 21st Century Seapower. Washington, DC: Department of the Navy.

    Google Scholar 

  • von Clausewitz, Carl. 1976 (1832). On War. Trans. M. Howard and P. Paret, Indexed ed. Princeton: Princeton University Press.

    Google Scholar 

  • Wæver, Ole. 1995. Securitization and Desecuritization. In On Security, ed. Ronnie D. Lipschutz, 46–86. New York: Columbia University Press.

    Google Scholar 

  • Wilkinson, C. 2011. The Limits of Spoken Words. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq, 94–115. London/New York: Routledge.

    Google Scholar 

  • Williams, Stewart. 2008. Rethinking the Nature of Disaster: From Failed Instruments of Learning to a Post-Social Understanding. Social Forces, 87 (2):1115–1138. http://muse.jhu.edu/journals/sof/summary/v087/87.2.williams.html. Accessed 31 Jan 2013.

  • Wylie, J.C. 1967. Military Strategy. New Brunswick: Rutgers University Press.

    Google Scholar 

  • Young, Carl S. 2010. Metrics and Methods for Security Risk Management. Burlington: Elsevier.

    Google Scholar 

  • Zedner, Lucia. 2003. The Concept of Security: An Agenda for Comparative Analysis. Legal Studies 23 (1): 153–176.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2018 The Author(s)

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Cordner, L. (2018). Creating an Analytical Framework: Maritime Security, Risk and Vulnerability. In: Maritime Security Risks, Vulnerabilities and Cooperation. New Security Challenges. Palgrave Macmillan, Cham. https://doi.org/10.1007/978-3-319-62755-7_2

Download citation

Publish with us

Policies and ethics