PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Methodology for identification of potential threats and ship operations as a part of ship security assessment

Autorzy
Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper presents the development of a methodology for the identification of possible intentional threats and key ship operations that may be significant for a ship’s security assessment, carried out by a Company Security Officer. The applicable international and domestic legal regulations regarding ship security systems are here analysed. Key factors and parameters that may provide support for the proper identification of realistic threats are also identified, giving practical relevance to this paper. The information reported here may be of support to those responsible for the development and revision of a ship’s security assessment as it addresses an important part of the maintenance of navigational safety of ship operations under the provisions of the International Ship and Port Facility Security Code – ISPS Code.
Rocznik
Strony
176--181
Opis fizyczny
Bibliogr. 19 poz., rys.
Twórcy
autor
  • Maritime University of Szczecin  Education and Certification Department
autor
  • Maritime University of Szczecin Ship Department
Bibliografia
  • 1. ABS (2005) Guide for Ship Security (SEC) 3 ed. [Online] Available from: https://www.eagle.org/eagleExternalPortalWEB/ShowProperty/BEA%20Repository/Rules&Guides/ Current/111_ShipSecurity(SEC)Notation/Pub111_ShipSecurity [Accessed: April 19, 2016]
  • 2. Benny, D.J. (2015) Maritime Security: Protection of Marinas, Ports, Small Watercrafts, Yachts and Ships. CRC Press.
  • 3. Bichou, K. (2015) The ISPS Code and the Cost of Port Compliance: An Initial Logistics and Supply Chain Framework for Port Security Assessment and Management. In: Haralambides H. Port Management. pp. 109–137.
  • 4. BV (2003) Ship security assessment – VentiSTAR, Maritime Division Ship in Service. [Online] Available from: www1. veristar.com [Accessed: April 20, 2016]
  • 5. ClassNK (2004) Steps of Ships Security Assessment, ClassNK. [Online] Available from: https://www.clasnk.org. jp [Accessed: April 19, 2016]
  • 6. Fernando, D., Martinez, A., Sidoti, D., Mishra, M., Han, X. & Pattipati, K. (2015) Context-based models to overcome operational challenges in maritime security, Technologies for Homeland Security (HST). IEEE International Symposium on Technologies for Homeland Security 14–15.04.2015. pp. 1–6.
  • 7. IACS (2008) Rec. No. 81. Guidance on the ISPS Code for Maritime Security Auditors. [Online] Available for: www. iacs.org.uk/publications/publications.aspx?pageid=4&sectioned=5 [Accessed: April 04, 2016]
  • 8. IMB (2016) Violent attacks worsen in seas of West Africa despite global piracy downturn. International Maritime Bureau report 27.04.2016. [Online] Available for: https://iccccs.org/icc/imb [Accessed: April 28, 2016]
  • 9. ISPS (2004) Międzynarodowy Kodeks dla ochrony statków i obiektów portowych, przyjętym w dniu 12 grudnia 2002 r., Regulacja Nr 2 Konferencji Umawiających się Rządów – Stron Międzynarodowej Konwencji o bezpieczeństwie życia na morzu, 1974 r. (D.U. z 2005 r., poz. 1016), zwana „Kodeksem ISPS”.
  • 10. Journal of Laws (2008) Ustawa z dnia 4 września 2008 r. o ochronie żeglugi i portów morskich (D.U. nr 2016, poz. 49).
  • 11. Knyazeva, N. & Korobeev, A. (2015) Maritime terrorism and Piracy: The Threat to Maritime Security. Mediterranean Journal of Social Sciences 6. pp. 226–232.
  • 12. Liwäng, H., Sörenson, K. & Österman, C. (2015) Ship security challenges in high-risk area: manageable or insurmountable? WMU Journal of Maritime Affairs 14 (2). pp. 201–217.
  • 13. NSA (2012) Guideline for performing Ship Security Assessment. p. 4. Norvegian Shipowners’ Association. [Online] Available from: http://www.tradewindsnews.com/incoming/ article262521.ece/binary/report%20report [Accessed: April 19, 16]
  • 14. Randić, M., Matika, D. & Możnik, D. (2015) SWOT analysis of deficiencies on ship components identified by Port State Control Inspections with aim to improve the safety of maritime navigation. Shipbuilding 66 (3). pp. 61–72.
  • 15. Ślączka, W., Prill, K. & Cieszyńska, K. (2010) Określenie potencjalnych zagrożeń dla terminali LNG na przykładzie terminala LNG w Świnoujściu. Logistyka 4. pp. CD–CD.
  • 16. Stec, K. (2011) Wybrane prawne narzędzia ochrony infrastruktury krytycznej w Polsce. Bezpieczeństwo Narodowe 19, III. pp. 181–197.
  • 17. Stróżyńska, M. & Abramowicz, W. (2015) A Dynamic Risk Assessment for Decision Support Systems in the Maritime Domain. Studia Ekonomiczne 165. pp. 295–307.
  • 18. UKMTO (2011) Best Management Practice for Protection against Somalia Based Piracy. Livingston, Edinburgh: Witherby Publishing Group Ltd.
  • 19. Urbański, J., Margaś, W. & Sprecht, C. (2008) Bezpieczeństwo morskie – ocena i kontrola ryzyka. Zeszyty Naukowe Marynarki Wojennej 2(173). pp.
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-8bbce854-117e-4519-9c9d-c4a797f1647e
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.