Introduction to the special issue on maritime security

  • Lu C
  • Chang C
  • Hsu Y
 et al. 
  • 18


    Mendeley users who have this article in their library.
  • N/A


    Citations of this article.


The terrorist attacks of 11 September 2001 heightened awareness about the vulnerability of all modes of transportation to terrorist attack. The issue of maritime security has therefore become a major concern in the international maritime sector over the past several years. Globalization has led to a strong growth in seaborne trade; however, it simultaneously increases vulnerability to not only terrorism but also international criminal activities that threaten the world's supply chain. For example, in 2008, the rise in piracy activities in the Gulf of Aden brought the issue of maritime security to the forefront of international debate. In addition to the direct impact on ships, crews and cargoes, and on the maritime industry and governments, piracy also threatens global seaborne trade, and has an impact on energy security and the environment [UNCTAD, 2009, Review of Maritime Transport 2009 (New York: United Nations)]. Maritime piracy can pose substantial risks to seaborne trades, with considerable commodities, ranging between raw materials and energy to high-value manufactured products, being shipped between global economic powerhouses [FU, X. W., NG, A. K. Y., LAU, Y. Y., forthcoming, The impacts of maritime piracy on global economic development: The case of Somalia. Maritime Policy and Management]. Maritime security management, including the definition of security, maritime risk assessment, security measures, the regulation and policy of maritime security in shipping and port-related business operations has been receiving growing attention, both in practice and research. [ABSTRACT FROM AUTHOR]
Copyright of Maritime Policy & Management is the property of Routledge and its content may not be copied or emailed to multiple sites or posted to a listserv without the copyright holder's express written permission. However, users may print, download, or email articles for individual use. This abstract may be abridged. No warranty is given about the accuracy of the copy. Users should refer to the original published version of the material for the full abstract. (Copyright applies to all Abstracts.)

Get free article suggestions today

Mendeley saves you time finding and organizing research

Sign up here
Already have an account ?Sign in

Find this document


  • Chin-Shan Lu

  • Chih-Ching Chang

  • Yung-Hao Hsu

  • Prakash Metaparti

Cite this document

Choose a citation style from the tabs below

Save time finding and organizing research with Mendeley

Sign up for free