Zhang / Roe | Maritime Container Port Security | E-Book | www2.sack.de
E-Book

E-Book, Englisch, 294 Seiten

Reihe: Progress in Mathematics

Zhang / Roe Maritime Container Port Security

USA and European Perspectives
1. Auflage 2019
ISBN: 978-3-030-03825-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark

USA and European Perspectives

E-Book, Englisch, 294 Seiten

Reihe: Progress in Mathematics

ISBN: 978-3-030-03825-0
Verlag: Springer International Publishing
Format: PDF
Kopierschutz: 1 - PDF Watermark



Placing special emphasis on the significant security issues associated with modern container international transport, this book provides in-depth exploration of both United States and European Union port and shipping policy, alongside that of wider international trade. The authors take an original and topical look at the security initiatives introduced by the USA and their impact in the EU. Based on original research by renowned experts in the field, this book provides vital insight for academics, government policy-makers and practitioners.

Xufan Zhang is a Lecturer in International Logistics at Beijing WuZi University.

Michael Roe holds the Chair in Maritime and Logistics Policy at Plymouth University, UK. He has extensive experience of working with maritime and logistics policy-makers across much of Europe, the Far East and the Middle East. Author of 14 books and editor of another five, Michael has published over 80 academic journal papers.

Zhang / Roe Maritime Container Port Security jetzt bestellen!

Autoren/Hrsg.


Weitere Infos & Material


1;Maritime Container Port Security;2
1.1;Acknowledgements;6
1.2;Contents;8
1.3;Abbreviations;10
1.4;List of Figures;13
1.5;List of Tables;14
1.6;List of Equations;16
2;1 Introduction;17
2.1;References;24
3;2 Maritime Security Measures and the Container Security Initiative (CSI);29
3.1;Development of Maritime Security;30
3.1.1;Maritime Security;33
3.1.1.1;Terrorism Threats;34
3.1.1.1.1;Container Cargo;35
3.1.1.1.2;Vessels;37
3.1.1.1.3;People;38
3.1.1.1.4;Financing and Logistics Support;38
3.1.2;Overview of Maritime Security Programmes;38
3.2;The Introduction of the CSI;40
3.2.1;US Customs and Border Protection (CBP);40
3.2.2;The Establishment of the CSI;43
3.2.3;The CSI Strategic Goals and Core Elements;45
3.2.4;Joining the CSI;46
3.2.4.1;CSI Three Phases Implementation;49
3.2.5;The CSI Positive Implications for Seaborne Trade;52
3.2.5.1;Trade Facilitation;52
3.2.5.2;Establishment of a Collaborative Network;54
3.2.5.2.1;Maritime Security Measure’s Implications for the Maritime Sector;56
3.2.6;Financing and Costs Associated with Maritime Security Measures;57
3.2.6.1;Ex-Ante Costs Assessment;57
3.2.6.2;Ex-Post Costs Assessment;59
3.2.6.3;The Implications of CSI Compliance Cost for Different Stakeholders;60
3.2.6.3.1;Port Authorities;61
3.2.6.3.2;Carriers;62
3.2.6.3.3;Exporters;62
3.2.7;Operational and Logistical Efficiency;64
3.3;References;66
4;3 Port Competition;74
4.1;Port Competition;74
4.2;Container Port Competition and Port Competitiveness;76
4.3;Port Selection;80
4.3.1;Port Competition and Port Selection at Regional Level;81
4.3.2;Determinants of Port Competitiveness;83
4.3.3;Port Efficiency;85
4.3.3.1;Port Ownership Structure and Port Efficiency;87
4.3.3.2;Port Size and Port Efficiency;89
4.3.4;Port Service;89
4.3.5;Other Issues;91
4.4;References;92
5;4 Models of Container Port Security;101
5.1;Conceptual Model;101
5.1.1;Maritime Transport Risk Factors;103
5.1.2;Maritime Security Measures;104
5.1.2.1;Financing and Costs;105
5.1.2.2;Efficiency;105
5.1.3;The CSI and Its Controversial Effects;106
5.1.4;EU Container Seaport Competition;107
5.2;Conceptual Assumptions;109
5.2.1;Conceptual Category 1: The Necessity of Pursuing Maritime Security Initiatives;109
5.2.2;Conceptual Category 2: Introduction of the CSI and Its Controversial Influences;110
5.2.3;Conceptual Category 3: Determinants of EU Container Seaport Competitiveness;111
5.2.4;Conceptual Category 4: The Implications of the CSI for EU Container Seaport Competition;111
5.3;References;114
6;5 Research Methodology for Container Port Security;118
6.1;Research Strategy and Method;118
6.1.1;Research Methods and Port Competitiveness Studies;119
6.1.2;The Choice of Qualitative Approach for This Research;119
6.1.3;Primary and Secondary Data Collection;120
6.1.4;Rationale for Adopting a Delphi Technique as the Qualitative Approach;121
6.1.5;The Origins and Use of Delphi;123
6.1.6;Characteristics of the Delphi Technique;125
6.1.6.1;Types of Delphi;126
6.2;Delphi Method Adopted;128
6.2.1;The Criticisms of Delphi;128
6.2.2;The Delphi Study Process;129
6.2.3;Panellist Formation;132
6.2.3.1;Panellists with Different Backgrounds;132
6.2.3.2;Panel Size;133
6.2.3.3;Process of Panel Selection;134
6.2.3.3.1;Academic Panellist Selection;134
6.2.3.3.2;Industrial Panellist Selection;136
6.2.3.3.3;Administrative Panellist Selection;137
6.2.4;Other Issues in Delphi Design;138
6.3;Survey Method for Identification of EU Port Competitiveness;140
6.4;Delphi Conceptual Statements and Rationale;142
6.4.1;Delphi Conceptual Category, Assumption and Statements;143
6.5;Outlining Delphi Design and Process;151
6.5.1;Consensus Level;153
6.5.2;Average Percentage of Majority Opinions (APMO);154
6.6;Research Ethics;156
6.7;References;157
7;6 The Delphi Research Process;169
7.1;Pilot Delphi Study;170
7.2;The Delphi Survey;171
7.2.1;Panel Participation;172
7.2.2;Size and Structure of Panel;173
7.3;Analysis of Delphi Round One;175
7.3.1;Consensus Reached After Round One;176
7.3.2;Reformulation of Statements for Delphi Round Two;178
7.3.2.1;S3 Original Statement;178
7.3.2.2;Reformulated Statement;178
7.3.2.3;Arguments;179
7.3.2.4;S4.1 Original Statement;179
7.3.2.5;Reformulated Statement;180
7.3.2.6;Arguments;180
7.3.2.7;S4.2 Original Statement;181
7.3.2.8;Reformulated Statement;181
7.3.2.9;Arguments;181
7.3.2.10;S4.4 Original Statement;182
7.3.2.11;Reformulated Statements;182
7.3.2.12;Argument;183
7.3.2.13;S4.5 Original Statement;183
7.3.2.14;Reformulated Statement;183
7.3.2.15;Arguments;184
7.3.2.16;S4.6 Original Statement;184
7.3.2.17;Reformulated Statement;185
7.3.2.18;Arguments;185
7.3.2.19;S5 Original Statement;185
7.3.2.20;Reformulated Statement;186
7.3.2.21;Arguments;186
7.4;Administration of Delphi Round Two;187
7.4.1;Response Rate Delphi Round Two;187
7.4.2;Analysis of the Responses to Delphi Round Two;188
7.4.3;Consensus Reached After Delphi Round Two;190
7.4.4;Reformulation of Statements for Delphi Round Three;190
7.4.4.1;S4.1 Original Statement;191
7.4.4.2;Arguments;191
7.4.4.3;Reformulated Statement;192
7.4.4.4;S4.2 Original Statement;192
7.4.4.5;Arguments;192
7.4.4.6;Reformulated Statement;193
7.4.4.7;S5 Original Statement;193
7.4.4.8;Arguments;193
7.4.4.9;Reformulated Statement;194
7.5;Administration of Delphi Round Three;194
7.5.1;Response Rates of Delphi Round Three;194
7.5.2;Analysis of the Responses to Delphi Round Three;195
7.5.3;Consensus Reached After Delphi Round Three;196
7.5.4;Statement Does Not Reach Consensus;196
7.6;References;198
8;7 The Delphi Results;199
8.1;Delphi Round One: Statements Reaching Consensus Level and Comments;199
8.2;Delphi Round Two: Statements Reaching Consensus Level and Comments;202
8.3;Delphi Round Three: Statements Reaching Consensus Level and Comments;205
8.4;The Revised Model;206
8.4.1;Conceptual Category 1: The Necessity of Pursuing a Maritime Security Initiative;207
8.4.2;Conceptual Category 2: Introduction of the CSI and Its Controversial Influences;207
8.4.3;Conceptual Category 3: Determinants of EU Container Seaport Competitiveness;207
8.4.4;Conceptual Category 4: Implications of Introduction of the CSI on EU Port Competition;208
9;8 The Implications for Container Port Security;209
9.1;Establishing the Methodological Rigour of the Delphi Method;210
9.1.1;Reliability;210
9.1.2;Validity;211
9.1.2.1;Content Validity;211
9.1.2.2;Criterion Validity;212
9.1.2.3;Construct Validity;213
9.1.3;Qualitative Research Trustworthiness Elements;213
9.1.3.1;Credibility;213
9.1.3.2;Transferability;216
9.1.3.3;Auditability: Dependability and Confirmability;216
9.2;Critical Analysis of the Implementation of Delphi;217
9.2.1;Justification of Panel Size and Response Rates;217
9.2.2;Advantages of the Delphi Study;219
9.2.3;Drawbacks of the Delphi Survey;219
9.3;The Necessity of Pursuing a Maritime Security Initiative;220
9.3.1;The Negativities of Maritime Security Measures;220
9.3.2;Maritime Security Measures—Current Implementation;221
9.3.2.1;Overestimation of Supply Chain Disruption;221
9.3.2.2;Compliance Costs Recuperation;222
9.3.2.3;Security Measures Compliance in Practice;223
9.4;Determinants of EU Container Seaport Competitiveness;224
9.4.1;Port Competitiveness Determinants Identified by the Literature Review;224
9.4.2;EU Container Seaport Competition and Influential Factors Suggested by the Delphi Results;225
9.4.3;‘5P’ Model Suggested by the Delphi for Port Selection;226
9.4.3.1;Port Security and Safety as Port Selection Intangible Criteria;227
9.5;The CSI and Its Controversial Influences;228
9.5.1;Improvement of Security Awareness;229
9.5.2;Container Security Initiative Collaborative Networking and Existing Issues;230
9.5.2.1;The Rationale of Information Sharing for the CSI;230
9.5.2.2;The Issues of Inequity Under CSI Bilateral Arrangement;231
9.5.3;Challenges Posed by Intelligence Sharing;231
9.5.4;Sovereignty and Administration Problems;232
9.6;The Implications of the CSI for EU Container Seaport Competition;235
9.6.1;Container Security Initiative and 24-Hour Rule Costs Recuperation;235
9.6.1.1;Initial Cost: Government and Port Authority Responsibility;235
9.6.1.2;EU Container Seaport Security Cost Recuperation and Revenue Generation;236
9.6.1.3;Carrier’s 24-Hour Rule Cost Recuperation;240
9.6.2;Container Security Initiative Compliance and Port Productivity;242
9.6.3;The CSI—Positive Effects on Trade Facilitation;244
9.6.4;Container Security Initiative—Implications for Small Ports;245
9.7;References;246
10;9 Maritime Governance, Security Measures and Port Competition in the EU;253
10.1;Economic Liberalism and Rationality;256
10.2;Maritime Governance and Security Measures;257
10.2.1;Hegemony in Maritime Governance and Maritime Security;257
10.2.2;EU Port Governance and Management;259
10.2.2.1;EU Port Ownership and Governance;260
10.2.2.2;Public–Private Ownership and Maritime Security;261
10.2.3;Container Security Initiative Participation in EU Port Ranges;263
10.3;Vertical Integration of Logistics and Port Function;266
10.4;Principal–Agent Relation and Asymmetric Information;267
10.5;References;269
11;10 Conclusions for Container Port Security;273
11.1;Realisation of the Research Aim and Objectives;273
11.1.1;Objective 1: To Review Earlier Work on Maritime Security and EU Container Seaport Competition;273
11.1.2;Objective 2: To Review the Various Port Security Regulations of the USA, Focusing on the CSI Programme and the Existing Debate Over Implications;274
11.1.3;Objective 3: To Identify the Determinants of EU Container Port Competitiveness;275
11.1.4;Research Objective 4: To Investigate the Effects of the CSI on EU Container Seaport Competition;276
11.1.4.1;CSI Compliance Cost;276
11.1.4.2;Port Productivity and Logistics Efficiency;277
11.1.4.3;Implications for EU Container Port Competition;278
11.1.5;Objective 5: To Propose a Sustainable Solution to Existing Issues Discovered on Maritime Security;279
11.1.5.1;Issue 1: Substantial Liability Issue;280
11.1.5.2;Issue 2: Collaboration Network Under Current Bilateral Regimes;280
11.1.5.3;Solution: Supply Chain Security Integration and Multilateral Regimes;281
11.2;Implementation Considerations;282
11.2.1;Stakeholder Participation and Commitment;282
11.2.2;Cost Issue;283
11.3;The Future;283
11.4;References;285
12;Index;287



Ihre Fragen, Wünsche oder Anmerkungen
Vorname*
Nachname*
Ihre E-Mail-Adresse*
Kundennr.
Ihre Nachricht*
Lediglich mit * gekennzeichnete Felder sind Pflichtfelder.
Wenn Sie die im Kontaktformular eingegebenen Daten durch Klick auf den nachfolgenden Button übersenden, erklären Sie sich damit einverstanden, dass wir Ihr Angaben für die Beantwortung Ihrer Anfrage verwenden. Selbstverständlich werden Ihre Daten vertraulich behandelt und nicht an Dritte weitergegeben. Sie können der Verwendung Ihrer Daten jederzeit widersprechen. Das Datenhandling bei Sack Fachmedien erklären wir Ihnen in unserer Datenschutzerklärung.