The used vulnerable 2013 tradownload
The outcomes can be used either as a stand-alone technique for prioritising critical systems such as port facilitates with high values and significant functions or as part of an integrated decision making method for evaluating the effectiveness of security control options. The model relies on the combination of fuzzy Bayesian reasoning and analytical hierarchy process (AHP) analysis in a complementary way so as to facilitate the treatment of uncertainty in data, thus realising effective quantitative analysis of the vulnerabilities under different threat modes in ports.
This paper develops an advanced threat-based criticality analysis methodology designed for the identification and prioritisation of vulnerable port facilities under uncertainties. The motivation for identifying the vulnerabilities is the need for prioritising activities and resources on port security investments and risk reduction processes. While conventional safety management techniques may be capable of dealing with accidental, hazard-based risks in port, new vulnerability analysis methods are urgently required for tackling those caused by threats such as terrorist attacks. Ng Jin WangĪddresses: Livepool Logistics, Offshore and Marine (LOOM) Research Institute, Liverpool John Moores University, R229a James Parsons Building, Byrom Street, Liverpool, UK ' Department of Supply Chain Management, IH Asper School of Business, University of Manitoba, 686-181 Freedman Crescent, Winnipeg, Manitoba, R3T 5V4, Canada ' Livepool Logistics, Offshore and Marine (LOOM) Research Institute, Liverpool John Moores University, R229a James Parsons Building, Byrom Street, Liverpool, UKĪbstract: Ports are exposed to various risks in their internal operations and external interactions with inland transport carriers and sea-going vessels within maritime logistics systems. Title: Prioritising security vulnerabilities in portsĪuthors: Zaili Yang Adolf K.Y.
Inderscience Publishers - linking academia, business and industry through research
Article: Prioritising security vulnerabilities in ports Journal: International Journal of Shipping and Transport Logistics (IJSTL) 2013 Vol.5 No.6 pp.622 - 636 Abstract: Ports are exposed to various risks in their internal operations and external interactions with inland transport carriers and sea-going vessels within maritime logistics systems.