PL EN


Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników
Tytuł artykułu

Implementation and Compliance of the International Ship and Port Facility Security Code in Mexico: A literature Review and Selected Issues

Treść / Zawartość
Identyfikatory
Warianty tytułu
Języki publikacji
EN
Abstrakty
EN
This paper provides a literature review of the state of the art on implementation and compliance of the International Ship and Port Facility Security Code (ISPS Code), for the case of Mexico. This investigation was initially oriented solely towards Mexico, but due to the absence of research within this subject for the referred country the review had to be done through subcategories with the conditional connection of Mexico and relevant issues were selected. The primary data confirmed the absence of research within this subject in Mexico. The secondary data, were other words related to the ISPS Code were used for the search, allowed for a wider geographical coverage and an expanded on general bases the scope of analysis, since ten (10) different academic databases were exploited. The literature review from an author-centric approach is initially presented; then, it is used as the basis to further develop (and examine) the concept-centric approach, through eight selected categories. The careful screening of literature, constructed on specific concepts, allowed the identification of cross fertilization of such concepts in the respective fields. It is observed that the research efforts focused on the ISPS Code and the development of a Port Facility Security Plan (PFSP) have an integrated perspective, where the categories of terrorism and counterterrorism, as well as maritime security management and the issue of port security have a strong interaction and dominant status. The results demonstrate the limited number of academic contributions in these areas from America Central and South America in relation to other parts of the globe, as well as the total absence of research efforts about the ISPS Code in Mexico. In the scientific contributions on the subject were Mexico is included; it is in reference to isolated cases of armed robbery, drugs organizations or proliferation of crime on general bases, but not regarding the ISPS Code itself. The absence of scientific research on this area for the specific country might also be related to the lack of a national maritime security policy and a poor maritime security culture as the authors have pointed out in other contributions.
Twórcy
  • World Maritime University, Malmö, Sweden
autor
  • World Maritime University, Malmö, Sweden 
Bibliografia
  • 1 Brocke, J., Simons, A., Niehaves, B., Reimer, K., & Plattfaut, R. (2009). Reconstructing the giant: On the importance of rigour in documenting the literature search process. ECIS.
  • 2 Espin-Digon, J., Burns-Herbert, & Bateman, S. R. (Red.). (2008). Lloyd's MIU Handbook of Maritime Security. Auerbach Publications.
  • 3 IMO International Maritime Organization. (Adoption: 1 November 1974; Entry into force: 25 May 1980). International Convention for the Safety of Life at Sea (SOLAS). Consulted on June 03, 2015 from http://www.imo.org/en/About/Conventions/ListOfConventions/Pages/International-Convention-for-the-Safety-of-Life-at-Sea-(SOLAS),-1974.aspx
  • 4 Kenneth, C. (2009). Port Security Management. Boca Raton Fl, USA: Auerbach Publications.
  • 5 Klein, N., Rothwell, D. R., & Mossop, J. (2009). Maritime Security: International Law and Policy Perspectives from Australia and New Zealand. Routledge.
  • 6 Norfjeld-Avila-Zuniga, A., Dalaklis, D. (2017). Enhancing Maritime Security in Mexico: Privatization, Militarization, or a combination of both? Chaumette, P., Economic challenge and New maritime risks management: What blue growth? (ss. 81-101).
  • 7 Piètre-Cambacédès, L., & Bouissou, M. (2013, February). Cross-fertilization between safety and security engineering. Reliability Engineering & System Safety, ss. 110-126.
  • 8 Tuerk, H. (2012). Publications on Ocean Development, Volume 71: Reflections on the Contemporary Law of the Sea. Chapter 6, Terrorism at Sea. BRILL.
  • 9 Vaggelas, G. K., & Ng, A. K. (2012). CH 33. Port Security: The ISPS Code. I W. K. Talley, The Blackwell Companion to Maritime Economics (ss. 674-700). Blackwell Publishing Ltd.
  • 10 Webster, J., & Watson, R. T. (2002, June). Analizing the past to prepare for the future: Writing a Literature Riview. MIS Quarterly (2), ss. xiii-xxiii.
  • 11 Weintrit, A. & Neumann T. (2015). Safety of Marine Transport. CRC Press-Taylor & Francis Group (ss. 9-10)
  • 12 Arias, J. F. (20014). Análisis para la aplicación de las comunicaciones GMDSS (Global Maritime Distress Security System) como estrategia en la optimización del proceso de seguridad logística para la navegación del puerto de Tumaco–Colombia. Universidad Militar Nueva Granada.
  • 13 Aronica, J. J., Mukhtyar, M., & Coon, J. E. (2001). Globalisation of Law Enforcement Efforts. Journal of Money Laundering Control (Vol. 4), ss. 320 - 332.
  • 14 Badiru, A. B., & Racz, L. (2013). Handbook of Emergency Response: A Human Factors and Systems Engineering Approach. CRC Press.
  • 15 Bahr, N. J. (2014). System Safety Engineering and Risk Assessment: A Practical Approach, (Second Edition. utg.). CRC Press.
  • 16 Bekefi, T., & Epstein, M. J. (2011). Integrating social and political risk into ROI calculations. Environmental Quality Management (Vol. 20), ss. 11-23.
  • 17 Bolz, F. J., Dudonis, K. J., & Schulz, D. P. (2012). Terrorism: An Overview. I F. Harold, & T. a. Nozaki, Information Security Management Handbook (Sixth Editio. utg., ss. 417-434). Auerbach Publications .
  • 18 Bragdon, C. (2008). Transportation Security. Butterworth-Heinemann.
  • 19 Brocke, J., Simons, A., Niehaves, B., Reimer, K., & Plattfaut, R. (2009). Reconstructing the giant: On the importance of rigour in documenting the literature search process. ECIS.
  • 20 Brown, M. E., Coté, O. R., Lynn-Jones, S. M., & Miller, S. E. (2010). Contending with Terrorism: Roots, Strategies and Responses. International Security Readers.
  • 21 Burgherr, P., & Hirschberg, S. (2009). Comparative Risk Assessment for Energy Systems: A Tool for Comprehensive Assessment of Energy Security. Wiley Handbook of Science and Technology for Homeland Security. 3:4:1. John Wiley & Sons, Inc.
  • 22 Castán, F. M. (2008). Marco jurídico de la seguridad marítima. Cuadernos de estrategia. Cuadernos de Estrategia, ss. 171-242.
  • 23 Crenshaw, M. (2010). The Consequences of Counterterrorism. Russell Sage Foundation.
  • 24 Crook, J. (2010). Stopping the spill [Power Oil Exploration]. Engineering & Technology, ss. 44 - 47.
  • 25 Cullen, P., & Berube, C. (2012). Maritime Private Security: Market Responses to Piracy, Terrorism and Waterborne Security Risks in the 21st Century. Routledge.
  • 26 Doro-on, A. M. (2014). Chapter 3. Introduction to Pipelines, Tunnels, Underground Rail and Transit Operations, Terrorism, and Disasters. I Risk Assessment and Security for Pipelines, Tunnels and Underground Rail and Transit Operations (ss. 89-130). CRC Press.
  • 27 Elizalde, P. A. (2012). La Incidencia de las Normas de Protección Marítima en el Transporte Marítimo. Universitat Autònoma de Barcelona.
  • 28 Enríquez, D. (2007). Terrorismo marítimo y libertad de navegación. La actividad de la organización marítima internacional en materia de protección y los claroscuros del Convenio SUA y del Protocolo SUA de octubre de 2005. Anuario Mexicano de Derecho Internacional.
  • 29 Espin-Digon, J., Burns-Herbert, & Bateman, S. R. (Red.). (2008). Lloyd's MIU Handbook of Maritime Security. Auerbach Publications.
  • 30 Fabiano, P. (2012). CH 60. Compliance in Mexico: Trends, Best Practices, and Challenges. I A. Tarantino, Governance, Risk, and Compliance Handbook: Technology, Finance, Environmental, and International Guidance and Best Practices (ss. 839-854). Wiley, John Wiley & Sons, Inc.
  • 31 Ferreirós, A. M. (2011, April). Una Vision del Escenario Marìtimo para las Pròximas Dècadas. Revista General de Marina (Issue 3), ss. 467-478.
  • 32 Frolov, K. v., & Baecher, G. B. (2006). Protection of Civilian Infrastructure from Acts of Terrorism. NATO Security trough Science Series -C Environmental Security (Vol. 12). Netherlands: Springer.
  • 33 Garcia, R. B., Monosalva, M. T., Rezende, S., & Sgut, M. (2004). Protección Marítima y Portuaria en América del Sur: Implementación de las Medidas y Estimación de Gastos (Vol. 81. utg.). (R. J. Sanchez, Red.) United Nations Publications.
  • 34 Giroux, J. (2010). A Portrait of Complexity: New Actors and Contemporary Challenges in the Global Energy System and the Role of Energy Infrastructure Security. Risk, Hazards & Crisis in Public Policy (Vol. 1), ss. 33-56.
  • 35 Goede, M. (2013). Transnational organized crime (TOC) and the relationship to good governance in the Caribbean: Transnational organized crime democracy (TOCD). International Journal of Development Issues, ss. 253 - 270.
  • 36 Gregory, D. (2011, September). The everywhere war. The Geographical Journal (Volume 177), ss. 238–250.
  • 37 Haimes, V., & Yacob, Y. (2011). On the Complex Quantification of Risk: Systems-Based Perspective on Terrorism. Risk Analysis (Vol. 31), ss. 1175-1186.
  • 38 Haynes, A. (2000). The Struggle Against Corruption — A Comparative Analysis. Journal of Financial Crime , ss. 123 - 135.
  • 39 Hesterman, J. L. (2013). The Terrorist-Criminal Nexus. An Alliance of International Drug Cartels, Organized Crime and Terror Groups. CRC Press.
  • 40 Hoti, S., & McAleer, M. (2005). Assessment of Risk Ratings and Risk Returns for 120 Representative Countries. I S. Hoti, & M. McAleer, Modelling the Riskiness in Country Risk Ratings (Contributions to Economic Analysis, Volume 273. utg., ss. 111 - 335). Emerald Group Publishing Limited.
  • 41 Ibrahim, N. H., & Allen, D. (2012, October). Information Sharing and Trust During Major Incidents: Findings from the oil industry. Journal of the American Society for Information Science and Technology (Volume 63), ss. 1916–1928.
  • 42 Jaradat, R. M., & Keating, C. B. (2014, June). Fragility of oil as a critical infrastructure problem. International Journal of Critical Infrastructure Protection (Volume 7), ss. 86-99.
  • 43 Johnsen, S., Lundteigen, M., Fartum, H., & Monsen, J. (u.d.). Identification and reduction of risks in remote operations of offshore oil and gas installations. SINTEF.
  • 44 Kenneth, C. (2009). Port Security Management. Boca Raton Fl, USA: Auerbach Publications.
  • 45 Klein, N., Rothwell, D. R., & Mossop, J. (2009). Maritime Security: International Law and Policy Perspectives from Australia and New Zealand. Routledge.
  • 46 Lewis, T. G. (2006). Critical Infrastructure Protection in Homeland Security. I Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation (ss. 463-474). Jon Wiley & Sons Inc.
  • 47 Lichterman, J. D. (1999, August 6). Disasters to come. Futures, ss. 593-607.
  • 48 Lutchman, C., Maharaj, R., & Waddah, G. (Red.). (2012). Safety Management:A Comprehensive Approach to Developing a Sustainable System. CRC Press.
  • 49 Maldonado, A. G. (2009, July). Seguridad operativa para el transporte del comercio exterior de México 558. Comercio Exterior, ss. 558-567.
  • 50 Martínez Gutiérrez, N. A. (2009). Serving the Rule of International Maritime Law: Essays in Honour of Professor David Joseph Attard. Routledge.
  • 51 Middleton, R., Glosec Ltd., D. U., Day, D., & Lallie, H. (2012). Global Network Security: A Vulnerability Assessment of Seven Popular Outsourcing Countries. Conference on Green Computing and Communications (GreenCom), (ss. 102 - 108 ). Besancon: IEEE International.
  • 52 Mugarura, N. (2014). Has globalisation rendered the state paradigm in controlling crimes, anachronistic?: The notion of borders, state and new crime typologies. Journal of Financial Crime (Vol. 21), ss. 381 - 399.
  • 53 Murphy, E. (1978). Legal Aspects of International Terrorism. Lexington Books.
  • 54 Mythen, G. (2014). Managing security under conditions of high uncertainty: Institutional strategies and dilemmas. I G. Deodatis, R.Bruce, & E. a. Frangopol (Red.), Safety, Reliability, Risk and Life-Cycle Performance of Structures and Infrastructures. CRC Press.
  • 55 Neumann, T. (Red.). (2013). Marine Navigation and Safety of Sea Transportation, Maritime Transport & Shipping. CRC Press.
  • 56 Nordfjeld, A. & Dalaklis D. (2016). Enhancing maritime security in Mexico: Privatization, militarization, or a combination of both? Human Sea Marisk, Conference paper.
  • 57 Norman, T. L. (2012). Counter Measures, Goals and Strategies. I H. F. Tipton, Information Security Management Handbook. (Sixth Edition. utg., ss. 437-450). Auerbach Publications.
  • 58 Papa, P. (July, 2013). US and EU strategies for maritime transport security: A comparative perspective. Transport Policy,(Volume 28), ss. 75-85.
  • 59 Park, P. (2013). International Law for Energy and the Environment (Second Edition. utg.). CRC Press.
  • 60 Perdikaris, J. (2014). Physical Security and Environmental Protection. CRC Press.
  • 61 Phillips, D. E. (2008). Terrorism and security in the caribbean before and after 9/11. I G. Caforio, G. Kümmel, & B. Purkayastha, Armed Forces and Conflict Resolution: Sociological Perspectives (Book Series: Contributions to Conflict Management, Peace Economics and Development, Volume 7. utg., ss. 97 - 138). Emerald Group Publishing Limited.
  • 62 Piètre-Cambacédès, L., & Bouissou, M. (2013, February). Cross-fertilization between safety and security engineering. Reliability Engineering & System Safety, ss. 110-126.
  • 63 Pilewsk, B. A., & Pilewski, P. C. (2012). CERT Resilience Management Model. I H. F. Tipton, & M. K. Nozaki, Information Security Management Handbook. (Sixth Edition, Volume 6. utg., ss. 135 -152).
  • 64 Pinkowski, J. (2008). Disaster Management Handbook. CRC Press.
  • 65 Preciado, J. C. (2009, August). Agendas geoeconómicas y geoestratégicas de la Alianza para la Seguridad y la Prosperidad de Norteamérica (ASPAN) cuestionamientos al modelo neoliberal. Investigaciones geográficas.
  • 66 Ringbom, H. (2007). Publications on Ocean Development: The EU Maritime Safety Policy and International Law. Martinus Nijhoff.
  • 67 Rogers, P. (2007). Global Security and the War on Terror, Elite Power and the Illusion of Control. Routledge.
  • 68 Safford, T. G., Ulrich, J. D., & Hamilton, L. C. (2012, December 30). Public perceptions of the response to the Deepwater Horizon oil spill: Personal experiences, information sources, and social context. Journal of Environmental Management (Volume 113), ss. 31-39.
  • 69 Schulz, D. P. (2011). The Counterterrorism Handbook: Tactics, Procedures, and Techniques. (Fourth Edition. utg.). CRC Press.
  • 70 Sgut, M. (2006). Efectos Economicos De Las Nuevas Medidas De Proteccion Maritima Y Portuaria. United Nations Publications.
  • 71 Singha, S., Bellerby, T., & Trieschmann, O. (2012). Detection and classification of oil spill and look-alike spots from SAR imagery using an Artificial Neural Network. Geoscience and Remote Sensing Symposium (IGARSS), 2012 IEEE International, (ss. 22-27 July).
  • 72 Speight, J. G. (2011). An Introduction to Petroleum Technology, Economics, and Politics. Wiley.
  • 73 Spurgin, A. J. (2009). Human Reliability Assessment Theory and Practice. CRC Press.
  • 74 Stoney, C., & Scanlon, J. (2014, December). Ad hoc Rules, Rights, and Rituals: The Politics of Mass Death. Journal of Contingencies and Crisis Management, ss. 223–237.
  • 75 T., J., & Tweedy, C. a. (2014). Healthcare Hazard Control and Safety Management (Third Edition. utg.). CRC Press.
  • 76 Tan, A. K.-J. (2005). Vessel-Source Marine Pollution: The Law and Politics of International Regulation. Cambridge University Press.
  • 77 Tanaka, Y. (2012). International Law of the Sea. Cambridge University Press.
  • 78 Taylor, P. D. (2009). Taylor, Paul D. (2009). Perspectivas sobre estrategia maritima: ensayos de las Americas, la nueva estrategia maritima de EE UU y comentario sobre una estrategia cooperativa para el poder naval en el siglo XXI. Naval War College Press, Government Printing Office.
  • 79 Theodore, L., & Dupont, R. (2012). Environmental Health and Hazard Risk Assessment: Principles and Calculations. CRC Press.
  • 80 Tuerk, H. (2012). Publications on Ocean Development, Volume 71: Reflections on the Contemporary Law of the Sea. Chapter 6, Terrorism at Sea. BRILL
  • 81 USA Government. (1997). Port Security: A National Planning Guide.
  • 82 Vaggelas, G. K., & Ng, A. K. (2012). CH 33. Port Security: The ISPS Code. I W. K. Talley, The Blackwell Companion to Maritime Economics (ss. 674-700). Blackwell Publishing Ltd.
  • 83 Vlcek, W. (2013). Securitizing Money to Counter Terrorist Finance: Some Unintended Consequences for Developing Economies. Journal of International Studies Perspectives.
  • 84 Weinberg, D. M. (2008). Homeland Security Perspective on Threats and Challenges. Wiley Handbook of Science and Technology for Homeland Security. 2:3:1. John Wiley & Sons Inc.
  • 85 Weintrit, & Adam. (2009). Marine Navigation and Safety of Sea Transportation. CRC Press.
  • 86 Weintrit, A., & Neumann, T. (2013). Marine Navigation and Safety of Sea Transportation: STCW, Maritime Education and Training (MET), Human Resources and Crew Manning, Maritime Policy, Logistics and Economic Matters. CRC Press.
  • 87 Woodward, J. L., & Pitbaldo, R. (2010). LNG Risk Based Safety: Modeling and Consequence Analysis. Wiley.
  • 88 Zabyelina, Y. (2013, January). Multilateral Security and ESDP Operations. (F. Attiná, & D. Irrera, Red.) Political Studies Review, ss. 91–92.
  • 89 Zamora, M. R. (2008). La seguridad marítima: problemática y alternativas institucionales. Universidad de Málaga.
Uwagi
Opracowanie rekordu w ramach umowy 509/P-DUN/2018 ze środków MNiSW przeznaczonych na działalność upowszechniającą naukę (2018).
Typ dokumentu
Bibliografia
Identyfikator YADDA
bwmeta1.element.baztech-e1897ddc-7ed2-4776-8906-77e5a7a96ce8
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.