Maritime Safety, Security and Piracy
, by Talley,Wayne- ISBN: 9781843117674 | 1843117673
- Cover: Hardcover
- Copyright: 12/31/2008
List of Contributors | p. xiii |
List of Figures | p. xv |
List of Tables | p. xvii |
Introduction | p. 1 |
Ships | |
International Ship Safety Regulations | |
Introduction | p. 11 |
Safety conventions of the IMO | p. 12 |
The flag state and its responsibilities | p. 13 |
Development of ships' registries and "flagging" | p. 13 |
Closed and open registers | p. 15 |
Open registers and flags of convenience: "flagging out" | p. 16 |
Classification societies and their use by flag states | p. 17 |
Ultimate responsibility for safety at sea | p. 20 |
Port state control | p. 21 |
Trends in application of regulation | p. 24 |
Conclusion | p. 28 |
Ship Formal Safety Assessment | |
Introduction | p. 31 |
A brief review of some noteworthy marine accidents | p. 32 |
The capsize of Herald of Free Enterprise | p. 32 |
The Estonia accident | p. 33 |
The Prestige accident | p. 33 |
Current status of formal safety assessment of ships | p. 34 |
Formal safety assessment | p. 36 |
Identification of hazards | p. 37 |
Assessment of risks | p. 38 |
Risk control options | p. 38 |
Cost-benefit assessment | p. 39 |
Decision-making | p. 39 |
Formal safety assessment of a generic fishing vessel | p. 39 |
Use of advances in technology for facilitating safety assessment | p. 48 |
Discussions and recommendations | p. 49 |
The brainstorming technique | p. 49 |
Need for interaction with other industries' safety and quality management systems | p. 50 |
Risk criteria | p. 50 |
Human element | p. 51 |
The availability and reliability of data/information | p. 51 |
Cost-benefit analysis | p. 52 |
Risk-Based Verification | p. 52 |
Conclusion | p. 53 |
Us Ship Accident Research | |
Introduction | p. 55 |
Data and methodology | p. 56 |
Crew and passenger injuries | p. 59 |
Vessel damages | p. 62 |
Oil spills | p. 65 |
Accident probability | p. 68 |
Marine safety enforcement programmes | p. 68 |
Accident and pollution prevention technologies | p. 70 |
Oil pollution liability | p. 70 |
Summary | p. 71 |
Security of Ships and Shipping Operations | |
Introduction | p. 73 |
Conventional risk assessment for shipping security: overview and critical analysis | p. 74 |
Maritime security and the layered regulatory approach | p. 75 |
Shipping security and reporting procedures | p. 76 |
Security incidents and precursor analysis | p. 77 |
Review of cost and operational impact of shipping security | p. 79 |
Compliance cost of shipping security | p. 79 |
Ex ante assessment | p. 79 |
Ex post assessment | p. 79 |
Procedural and operational impacts | p. 82 |
Towards a new approach for efficient investment in shipping security | p. 84 |
Conclusion | p. 86 |
Piracy in Shipping | |
Introduction | p. 89 |
The Act | p. 90 |
Regions affected | p. 91 |
Impacts | p. 93 |
Security | p. 94 |
Patrols | p. 94 |
Security equipment | p. 96 |
Reporting | p. 97 |
Data and estimation results | p. 97 |
Summary | p. 100 |
Ship Piracy: Ship Type and Flag | |
Introduction | p. 103 |
Definitional aspect and piracy typology | p. 104 |
Statistical studies on piracy | p. 107 |
An econometric analysis on acts of piracy | p. 113 |
Discussion and conclusions | p. 118 |
Ports | |
Port Safety and Workers | |
Introduction | p. 123 |
Early cargo handling and safety | p. 124 |
Dock work-the early years | p. 124 |
Casual labour | p. 125 |
Speed of operations | p. 126 |
Training | p. 126 |
Advent of the container and changes to cargo handling equipment | p. 127 |
Fighting for improved conditions-unions | p. 129 |
Impact of US unions | p. 129 |
Unions and safety-around the globe | p. 131 |
Link between unions and safety | p. 133 |
Safety plans | p. 133 |
Port authority plans | p. 133 |
Industry plans | p. 135 |
US Occupational Safety and Health Administration (OSHA) | p. 135 |
Cost of worker injuries | p. 137 |
Management | p. 141 |
Terminal management | p. 141 |
Industry management | p. 142 |
Modern safety mechanisms | p. 143 |
Automatic guided vehicles | p. 144 |
Twist locks | p. 144 |
Mooring | p. 145 |
Radio frequency and optical character recognition | p. 146 |
Early worker health programmes | p. 146 |
Docker hospitals and clinics | p. 146 |
Spread of epidemics | p. 147 |
Current occupational health programmes | p. 147 |
Emissions | p. 148 |
Dust | p. 150 |
Conclusion | p. 152 |
Port State Control Inspection and Vessel Detention | |
Introduction | p. 153 |
PSC inspection and detention records | p. 154 |
An estimation of factors influencing the detention rate | p. 157 |
Conclusion | p. 164 |
Appendix 1 | p. 166 |
Appendix 2 | p. 168 |
Port Ship Accidents and Risks | |
Introduction | p. 169 |
The sources of risk to ships in ports | p. 170 |
Statistical overview of ship accidents in ports | p. 171 |
Average distribution | p. 174 |
Long-term trends | p. 180 |
Human risk | p. 182 |
Assessment for ship risks in ports | p. 185 |
Count model | p. 185 |
Exponential decay model | p. 186 |
Traffic-based simulation model | p. 187 |
Risk control measures | p. 190 |
Summary | p. 193 |
Port Security: A Risk Based Perspective | |
Introduction | p. 195 |
General risk management elements | p. 195 |
Risk issues for port security | p. 201 |
Situation analysis: hazards | p. 202 |
Situation analysis: delivery mechanism | p. 203 |
Situation analysis: consequences and impacts | p. 204 |
Situation analysis: vulnerability and resilience | p. 204 |
Strategies and actions for mitigating risks | p. 205 |
The three Rs: response, remediation and recovery | p. 206 |
Thinking ahead: challenges in port risk management | p. 207 |
Port security involves multiple jurisdictions | p. 207 |
Port security is part of a larger supply chain | p. 208 |
Programme disparity and complexity | p. 210 |
Information sharing and privacy | p. 210 |
The timing challenge | p. 210 |
The costs of port security | p. 211 |
Measuring the performance of the security strategy | p. 211 |
Summary | p. 213 |
International security programmes (strategies) | p. 214 |
US national security programmes (strategies) | p. 214 |
Us Port Security | |
Introduction | p. 217 |
Port security legislation and programmes | p. 217 |
Financing port security | p. 221 |
Port security incident cycle | p. 226 |
Prevention | p. 226 |
Detection | p. 227 |
Response and recovery | p. 227 |
Port operating objectives and security | p. 227 |
Port disruptions from security breaches | p. 231 |
Summary | p. 232 |
Eu Port and Shipping Security | |
Introduction | p. 235 |
The US approach | p. 236 |
The European path towards maritime security | p. 241 |
Is there a European approach? | p. 245 |
The initial "following the same path" approach | p. 245 |
Towards a distinctive approach | p. 247 |
Comparing policy-making and implementation regimes | p. 251 |
Conclusions | p. 254 |
Port Security in Asia | |
Introduction | p. 257 |
The ISPS Code and port security | p. 258 |
The situation: evidences from APEC member economies | p. 261 |
Obstacles and challenges | p. 266 |
Conclusions | p. 275 |
A template of the CTAP (sections A1 and A2 only) | p. 277 |
Selected international maritime security conferences held in Asia | p. 278 |
Landside Cargo Theft | |
Introduction | p. 279 |
The evolution of cargo theft | p. 280 |
The process of cargo theft | p. 285 |
The fence | p. 285 |
The thief | p. 287 |
The modus operandi | p. 288 |
Document fraud | p. 289 |
Warehouse theft | p. 290 |
The role of insurance | p. 291 |
Law enforcement | p. 294 |
Private sector deterrence measures | p. 296 |
Tools for container physical security | p. 297 |
Conclusion | p. 299 |
List of References | p. 301 |
Index | p. 329 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.
Digital License
You are licensing a digital product for a set duration. Durations are set forth in the product description, with "Lifetime" typically meaning five (5) years of online access and permanent download to a supported device. All licenses are non-transferable.
More details can be found here.