Advertisement

Creating an Analytical Framework: Maritime Security, Risk and Vulnerability

Chapter
  • 450 Downloads
Part of the New Security Challenges book series (NSECH)

Abstract

Traditional and contemporary concepts of maritime security are explored, along with concepts of risk and vulnerability, as they apply to strategic analysis. A brief epistemological scan supports the development of a conceptual basis for understanding the nexus between security, risk and vulnerability. The emerging convergence between security and risk, as normative concepts, is identified. Theoretical constructs are drawn together to develop a composite framework with practical applications for complex international security contexts. A universal definition of maritime security is proposed that includes traditional and non-traditional security challenges and encompasses notions of risk and vulnerability. Common theoretical bases and workable definitions likely to be acceptable to the majority of actors are necessary precursors to practical collective and cooperative maritime security advancement in the Indian Ocean.

References

  1. Akaha, Tsuneo. 1991. Japan’s Comprehensive Security Policy: A New East Asian Environment. Asian Survey 31 (4):324–340. http://www.jstor.org/stable/2645387. Accessed 23 May 2013.
  2. ASEAN Regional Forum (ARF). 2013. http://aseanregionalforum.asean.org/. Accessed 7 June.
  3. Australian Department of Defence. 2000. Australian Maritime Doctrine: RAN Doctrine 1 2000. 1st ed. Canberra: Defence Publishing Service.Google Scholar
  4. Australian Government, Department of Defence. 2009. Defending Australia in the Asia Pacific Century: Force 2030. Canberra: Australian Government Publishing Service.Google Scholar
  5. ———. 2013. 2013 Defence White Paper. Canberra: Australian Government Publishing Service.Google Scholar
  6. Australian/New Zealand Standards (AS/NZS 2009). 2009. Risk Management – Principles and Guidelines, AS/NZS ISO 31000:2009. Sydney: Standards Australia.Google Scholar
  7. Baldwin, David A. 1997. The Concept of Security. Review of International Studies 23 (1): 5–26. http://journals.cambridge.org/abstract_S0260210597000053. Accessed 25 Mar 2013.
  8. Ball, Desmond. 2011. Asia’s Naval Arms Race: Myth or Reality? Paper Prepared for the 25th Asia-Pacific Roundtable, Kuala Lumpur, Malaysia, May 29–June 1. http://www.isis.org.my/files/25APR/paper_cs_2_desmond_ball.pdf. Accessed 10 Sept 2012.
  9. Balzacq, Thierry, ed. 2011. Securitization Theory: How Security Problems Emerge and Dissolve. London/New York: Routledge.Google Scholar
  10. Bateman, Sam. 2011. Solving the “Wicked Problems” of Maritime Security: Are Regional Forums up to the Task? Contemporary Southeast Asia 33 (1): 1–28.CrossRefGoogle Scholar
  11. Bateman, Sam, Joshua Ho, and Jane Chan. 2009. Good Order at Sea. RSIS Policy Paper. Singapore: Nanyang Technological University.Google Scholar
  12. Beck, Ulrich. 1992. Risk Society: Towards a New Modernity. London: Sage.Google Scholar
  13. ———. 1999. World Risk Society. Cambridge: Polity Press.Google Scholar
  14. ———. 2009a. Critical Theory of World Risk Society: A Cosmopolitan Vision. Constellations 16 (1): 3–22.CrossRefGoogle Scholar
  15. ———. 2009b. World Risk Society and Manufactured Uncertainties. Iris: European Journal of Philosophy and Public Debate 1 (2): 291–299.Google Scholar
  16. Booth, Ken. 1997. Security and Self: Reflections of a Fallen Realist. In Critical Security Studies: Concepts and Cases, ed. Keith Krause and Michael C. Williams, 83–119. Minneapolis: University of Minnesota Press.Google Scholar
  17. Brauch, Hans Günter. 2011. Concepts of Security Threats, Challenges, Vulnerabilities and Risks. In Coping with Global Environmental Change, Disasters and Security: Threats, Challenges, Vulnerabilities and Risks, ed. Hans Günter Brauch, Úrsula Oswald Spring, Czeslaw Mesjasz, John Grin, Patricia Kameri-Mbote, Béchir Chourou, Pál Dunay, and Jörn Birkmann, 61–106. Berlin/Heidelberg: Springer.CrossRefGoogle Scholar
  18. Brauch, Hans Günter, and Úrsula Oswald Spring. 2011. Introduction: Coping with Global Environmental Change in the Anthropocene. In Coping with Global Environmental Change, Disasters and Security: Threats, Challenges, Vulnerabilities and Risks, ed. Hans Günter Brauch, Úrsula Oswald Spring, Czeslaw Mesjasz, John Grin, Patricia Kameri-Mbote, Béchir Chourou, Pál Dunay, and Jörn Birkmann, 31–60. Berlin/Heidelberg: Springer.CrossRefGoogle Scholar
  19. Brooks, Nick, W. Neil Adger, and P. Mick Kelly. 2005. The Determinants of Vulnerability and Adaptive Capacity at the National Level and the Implications for Adaptation. Global Environmental Change 15: 151–163.CrossRefGoogle Scholar
  20. Burke, Anthony. 2012. Security. In An Introduction to International Relations, ed. Richard Devetak, Anthony Burke, and Jim George, 2nd ed., 160–171. New York: Cambridge University Press.Google Scholar
  21. China, People’s Republic. 2013. The Diversified Employment of China’s Armed Forces. Beijing: Information Office of the State Council.Google Scholar
  22. Corbett, Julian. 1911. Some Principles of Maritime Strategy. London: Longmans, Green and Co..Google Scholar
  23. Council for Security Cooperation in the Asia-Pacific (CSCAP). 1996. The Concepts of Comprehensive Security and Cooperative Security. CSCAP Memorandum No. 3. http://www.cscap.org/. Accessed 23 May 2013.
  24. Craig, Gordon A., and Felix Gilbert. 1986. Reflections on Strategy in the Present and Future. In Makers of Modern Strategy: From Machiavelli to the Nuclear Age, ed. Peter Paret, 863–871. Princeton: Princeton University Press.Google Scholar
  25. Dalby, Simon. 1997. Contesting an Essential Concept: Reading the Dilemmas in Contemporary Security Discourse. In Critical Security Studies: Concepts and Cases, ed. Keith Krause and Michael C. Williams, 3–31. Minneapolis: University of Minnesota Press.Google Scholar
  26. Elahi, Golnaz, Eric Yu, and Nicola Zannone. 2011. Security Risk Management by Qualitative Vulnerability Analysis. Paper Presented at the Third International Workshop on Security Measurements and Metrics, Banff. http://ieeexplore.ieee.org.proxy.library.adelaide.edu.au/stamp/stamp.jsp?tp=&arnumber=6165757. Accessed 2 Jan 2013.
  27. Evans, Gareth. 1994. Cooperative Security and Intrastate Conflict. Foreign Policy 96: 3–21.CrossRefGoogle Scholar
  28. Gaddis, John Lewis. 1982. Strategies of Containment: A Critical Appraisal of Postwar American National Security Policy. Oxford: Oxford University Press.Google Scholar
  29. Hertz, John H. 1950. Idealist Internationalism and the Security Dilemma. World Politics 2 (2): 171–201.Google Scholar
  30. Hsiung, James C. 2004. Comprehensive Security: Challenge for Pacific Asia. New York: University of Indianapolis Press.Google Scholar
  31. Intergovernmental Panel on Climate Change (IPCC). 2007. Climate Change 2007: Impacts, Adaptation and Vulnerability. Contribution of Working Group II to the Fourth Assessment Report of the Intergovernmental Panel on Climate Change, ed. Martin Parry, Osvaldo Canziani, Jean Palutikof, Paul van der Linden, and Clair Hanson. Cambridge UK: Cambridge University Press. http://www.ipcc.ch/publications_and_data/publications_ipcc_fourth_assessment_report_wg2_report_impacts_adaptation_and_vulnerability.htm. Accessed 27 Aug 2013.
  32. ———. 2014. Climate Change 2014: Impacts, Adaptation, and Vulnerability: Summary for Policymakers. IPCC WGII AR5 Summary for Policymakers WGII AR5 Phase I Report Launch 1, 31 March 2014. http://ipcc-wg2.gov/AR5/images/uploads/IPCC_WG2AR5_SPM_Approved.pdf. Accessed 6 Apr 2014.
  33. International Organization for Standardization (ISO). 2009. ISO Guide 73: Risk Management – Vocabulary. 1st ed. Geneva: International Organization for Standardization.Google Scholar
  34. ———. 2010. HB 158–2010: Handbook – Delivering Assurance Based on ISO 31000:2009 Risk management – Principles and Guidelines. 2nd ed. Sydney: International Organization for Standardization.Google Scholar
  35. Jayasuriya, Kanushka. 2009. Comprehensive Security, the Post Cold War and the Transformation of the State. In Comprehensive Security in the Asia-Pacific Region, ed. Hari Singh and Colin Dürkop, 15–33. Germany: Konrad Adenauer Stiftung.Google Scholar
  36. Jervis, Robert. 1976. Perception and Misperception in International Politics. Princeton: Princeton University Press.Google Scholar
  37. ———. 1978. Cooperation Under the Security Dilemma. World Politics 30 (2): 167–174.CrossRefGoogle Scholar
  38. Kaplan, Robert D. 2010. Monsoon: The Indian Ocean and the Battle for Supremacy in the 21st Century. Collingwood: Black Inc..Google Scholar
  39. Krahmann, Elke, ed. 2005. New Threats and New Actors in International Security. New York: Palgrave Macmillan.Google Scholar
  40. Krause, Keith, and Michael C. Williams, eds. 1997. Critical Security Studies: Concepts and Cases. Minneapolis: University of Minnesota Press.Google Scholar
  41. Latour, Bruno. 2003. Is Re-modernization Occurring – And If So, How to Prove It?: A Commentary on Ulrich Beck. Theory, Culture & Society 20 (2): 35–48.CrossRefGoogle Scholar
  42. League of Nations. 1919. The Covenant of the League of Nations. Entered Into Force January 10, 1920, Paris.Google Scholar
  43. Lipschutz, Ronnie D., ed. 1995. On Security. New York: Columbia University Press.Google Scholar
  44. Lobo-Guerrero, Luis. 2010. The International Political Sociology of Risk. The International Studies Encyclopedia 7: 4418–4436.Google Scholar
  45. ———. 2011. Insuring Security: Biopolitics, Security and Risk. Abingdon/Oxon/New York: Routledge.Google Scholar
  46. Mahan, Alfred Thayer. 1890. The Influence of Sea Power Upon History: 1660–1783. New York: Hill and Wang.Google Scholar
  47. McCarthy, Margot. 2012. Whole of Government Protective Security Outlook. Paper Presented at the Security in Government Conference, Canberra, September 4. http://www.dpmc.gov.au/national_security/speeches/2012-09-04_WoG_protective_security_outlook.pdf. Accessed 11 Apr 2013.
  48. Mesjasz, Czeslaw. 2011. Economic Vulnerability and Economic Security. In Coping with Global Environmental Change, Disasters and Security: Threats, Challenges, Vulnerabilities and Risks, ed. Hans Günter Brauch, Úrsula Oswald Spring, Czeslaw Mesjasz, John Grin, Patricia Kameri-Mbote, Béchir Chourou, Pál Dunay, and Jörn Birkmann, 123–156. Berlin/Heidelberg: Springer.CrossRefGoogle Scholar
  49. Mohan, C. Raja. 2012. Samudra Manthan: Sino-Indian Rivalry in the Indo-Pacific. Washington, DC: Carnegie Endowment.Google Scholar
  50. Mythen, Gabe. 2004. Ulrich Beck: A Critical Introduction to the Risk Society. London/Sterling: Pluto Press.Google Scholar
  51. Navy, Indian. 2007. Freedom to Use the Seas: India’s Maritime Military Strategy. Integrated Headquarters Ministry of Defence (Navy): New Delhi.Google Scholar
  52. Palme, Olof. 1982. Common Security: A Programme for Disarmament. The Report of the Independent Commission on Disarmament and Security Issues. London: Pan Books.Google Scholar
  53. Petersen, Karen Lund. 2011. Risk Analysis – A Field Within Security Studies? European Journal of International Relations 18 (4): 693–717.CrossRefGoogle Scholar
  54. Rahman, Chris. 2009. Concepts of Maritime Security: A Strategic Perspective on Alternative Visions for Good Order and Security at Sea, with Policy Implications for New Zealand. Discussion Paper 07/09, Centre for Strategic Studies, Victoria University of Wellington.Google Scholar
  55. Rolfe, Jim. 2008. Regional Security for the Asia-Pacific: Ends and Means. Contemporary Southeast Asia: A Journal of International & Strategic Affairs 30 (1): 99–117.CrossRefGoogle Scholar
  56. Rourke, John T. 1993. International Politics on the World Stage. 4th ed. Guilford: The Dushkin Publishing Group.Google Scholar
  57. Shergold, Peter. 2004. Connecting Government: Whole of Government Responses to Australia’s Priority Challenges. Canberra: Commonwealth of Australia. http://www.apsc.gov.au/__data/assets/pdf_file/0006/7575/connectinggovernment.pdf. Accessed 14 Apr 2013.
  58. Stockholm International Peace Research Institute (SIPRI). 2012. Background Paper on SIPRI Military Expenditure Data, 2011. http://www.sipri.org/research/armaments/milex. Accessed 10 Sept.
  59. Sun Tzu. 2005 (~512 BC). The Art of War: Sun Tzu. Trans. C. Thomas. Boston/London: Shambhala.Google Scholar
  60. Till, Geoffrey. 1984. Maritime Strategy and the Nuclear Age. 2nd ed. London/Basingstoke: Macmillan Press.Google Scholar
  61. ———. 1994. Seapower: Theory and Practice. Essex: Frank Cass.Google Scholar
  62. ———. 2013. Seapower: A Guide for the Twenty-First Century. 3rd ed. London/New York: Routledge.Google Scholar
  63. United Nations. 1945. Charter of the United Nations. Entered Into Force October 24, 1945, San Francisco.Google Scholar
  64. ———. 1983. The United Nations Convention on the Law of the Sea (UNCLOS). New York: United Nations.Google Scholar
  65. United Nations General Assembly (UNGA). 2004. Follow-Up to the Outcome of the Millennium Summit. Note by the Secretary-General, A/59/565, December 2, Fifty-Ninth Session, Agenda Item 55.Google Scholar
  66. United States Government, Department of Defense. 2010. Quadrennial Defense Review Report. http://www.defense.gov/qdr/images/QDR_as_of_12Feb10_1000.pdf. Accessed 17 July 2013.
  67. United States Navy, United States Marine Corps and United States Coast Guard. 2007. A Cooperative Strategy for 21st Century Seapower. Washington, DC: Department of the Navy.Google Scholar
  68. von Clausewitz, Carl. 1976 (1832). On War. Trans. M. Howard and P. Paret, Indexed ed. Princeton: Princeton University Press.Google Scholar
  69. Wæver, Ole. 1995. Securitization and Desecuritization. In On Security, ed. Ronnie D. Lipschutz, 46–86. New York: Columbia University Press.Google Scholar
  70. Wilkinson, C. 2011. The Limits of Spoken Words. In Securitization Theory: How Security Problems Emerge and Dissolve, ed. Thierry Balzacq, 94–115. London/New York: Routledge.Google Scholar
  71. Williams, Stewart. 2008. Rethinking the Nature of Disaster: From Failed Instruments of Learning to a Post-Social Understanding. Social Forces, 87 (2):1115–1138. http://muse.jhu.edu/journals/sof/summary/v087/87.2.williams.html. Accessed 31 Jan 2013.
  72. Wylie, J.C. 1967. Military Strategy. New Brunswick: Rutgers University Press.Google Scholar
  73. Young, Carl S. 2010. Metrics and Methods for Security Risk Management. Burlington: Elsevier.Google Scholar
  74. Zedner, Lucia. 2003. The Concept of Security: An Agenda for Comparative Analysis. Legal Studies 23 (1): 153–176.CrossRefGoogle Scholar

Copyright information

© The Author(s) 2018

Authors and Affiliations

  1. 1.University of AdelaideKiamaAustralia

Personalised recommendations