English Polish
Akademia Morska w Szczecinie

DSpace Home

DSpace/Manakin Repository

Show simple item record

Author Prill, Katarzyna
Affiliation Maritime University of Szczecin Education and Certification Department
E-mail k.prill@am.szczecin.pl
Author Szymczak, Marcin
Affiliation Maritime University of Szczecin Ship Department
E-mail m.szymczak@am.szczecin.pl
ISSN printed 1733-8670
URI https://repository.am.szczecin.pl/handle/123456789/2337
Abstract This paper presents the development of a methodology for the identification of possible intentional threats and key ship operations that may be significant for a ship’s security assessment, carried out by a Company Security Officer. The applicable international and domestic legal regulations regarding ship security systems are here analysed. Key factors and parameters that may provide support for the proper identification of realistic threats are also identified, giving practical relevance to this paper. The information reported here may be of support to those responsible for the development and revision of a ship’s security assessment as it addresses an important part of the maintenance of navigational safety of ship operations under the provisions of the International Ship and Port Facility Security Code – ISPS Code.
Pages 176–181
Publisher Scientific Journals Maritime University of Szczecin, Zeszyty Naukowe Akademia Morska w Szczecinie
Keywords safety of navigation
Keywords threats
Keywords security assessment
Keywords ISPS Code
Keywords terrorism
Keywords system
Keywords identification methods
Title Methodology for identification of potential threats and ship operations as a part of ship security assessment
Type Review article
References
  1. ABS (2005) Guide for Ship Security (SEC) 3 ed. [Online] Available from: https://www.eagle.org/eagleExternalPortal- WEB/ShowProperty/BEA%20Repository/Rules&Guides/ Current/111_ShipSecurity(SEC)Notation/Pub111_ShipSecurity [Accessed: April 19, 2016]
  2. Benny, D.J. (2015) Maritime Security: Protection of Marinas, Ports, Small Watercrafts, Yachts and Ships. CRC Press.
  3. Bichou, K. (2015) The ISPS Code and the Cost of Port Compliance: An Initial Logistics and Supply Chain Framework for Port Security Assessment and Management. In: Haralambides H. Port Management. pp. 109–137.
  4. BV (2003) Ship security assessment – VentiSTAR, Maritime Division Ship in Service. [Online] Available from: www1. veristar.com [Accessed: April 20, 2016]
  5. ClassNK (2004) Steps of Ships Security Assessment, ClassNK. [Online] Available from: https://www.clasnk.org. jp [Accessed: April 19, 2016]
  6. Fernando, D., Martinez, A., Sidoti, D., Mishra, M., Han, X. & Pattipati, K. (2015) Context-based models to overcome operational challenges in maritime security, Technologies for Homeland Security (HST). IEEE International Symposium on Technologies for Homeland Security 14–15.04.2015. pp. 1–6.
  7. IACS (2008) Rec. No. 81. Guidance on the ISPS Code for Maritime Security Auditors. [Online] Available for: www. iacs.org.uk/publications/publications.aspx?pageid=4§ioned= 5 [Accessed: April 04, 2016]
  8. IMB (2016) Violent attacks worsen in seas of West Africa despite global piracy downturn. International Maritime Bureau report 27.04.2016. [Online] Available for: https://iccccs. org/icc/imb [Accessed: April 28, 2016]
  9. ISPS (2004) Międzynarodowy Kodeks dla ochrony statków i obiektów portowych, przyjętym w dniu 12 grudnia 2002 r., Regulacja Nr 2 Konferencji Umawiających się Rządów – Stron Międzynarodowej Konwencji o bezpieczeństwie życia na morzu, 1974 r. (D.U. z 2005 r., poz. 1016), zwana „Kodeksem ISPS”.
  10. Journal of Laws (2008) Ustawa z dnia 4 września 2008 r. o ochronie żeglugi i portów morskich (D.U. nr 2016, poz. 49).
  11. Knyazeva, N. & Korobeev, A. (2015) Maritime terrorism and Piracy: The Threat to Maritime Security. Mediterranean Journal of Social Sciences 6. pp. 226–232.
  12. Liwäng, H., Sörenson, K. & Österman, C. (2015) Ship security challenges in high-risk area: manageable or insurmountable? WMU Journal of Maritime Affairs 14 (2). pp. 201–217.
  13. NSA (2012) Guideline for performing Ship Security Assessment. p. 4. Norvegian Shipowners’ Association. [Online] Available from: http://www.tradewindsnews.com/incoming/ article262521.ece/binary/report%20report [Accessed: April 19, 16]
  14. Randić, M., Matika, D. & Możnik, D. (2015) SWOT analysis of deficiencies on ship components identified by Port State Control Inspections with aim to improve the safety of maritime navigation. Shipbuilding 66 (3). pp. 61–72.
  15. Ślączka, W., Prill, K. & Cieszyńska, K. (2010) Określenie potencjalnych zagrożeń dla terminali LNG na przykładzie terminala LNG w Świnoujściu. Logistyka 4. pp. CD–CD.
  16. Stec, K. (2011) Wybrane prawne narzędzia ochrony infrastruktury krytycznej w Polsce. Bezpieczeństwo Narodowe 19, III. pp. 181–197.
  17. Stróżyńska, M. & Abramowicz, W. (2015) A Dynamic Risk Assessment for Decision Support Systems in the Maritime Domain. Studia Ekonomiczne 165. pp. 295–307.
  18. UKMTO (2011) Best Management Practice for Protection against Somalia Based Piracy. Livingston, Edinburgh: Witherby Publishing Group Ltd.
  19. Urbański, J., Margaś, W. & Sprecht, C. (2008) Bezpieczeństwo morskie – ocena i kontrola ryzyka. Zeszyty Naukowe Marynarki Wojennej 2(173). pp.
ISSN on-line 2392-0378
Language English
Funding No data
Figures 1
Tables 0
DOI 10.17402/192
Published 2016-12-28
Accepted 2016-12-02
Recieved 2016-04-29


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search repository

Advanced Search

Browse

My Account

RSS Feeds