On the success rates of maritime piracy attacks
Abstract Today, modern pirates operate both in ports and on the open sea and use state-of-the-art equipment. Their crimes range from simple robbery to murder and hijacking of entire ships for ransom demand. It is the purpose of this paper to investigate the modern piracy trends and the effect of pre...
Ausführliche Beschreibung
Autor*in: |
Psarros, George Ad. [verfasserIn] |
---|
Format: |
E-Artikel |
---|---|
Sprache: |
Englisch |
Erschienen: |
2011 |
---|
Schlagwörter: |
---|
Anmerkung: |
© Springer Science + Business Media, LLC 2011 |
---|
Übergeordnetes Werk: |
Enthalten in: Journal of transportation security - New York, NY : Springer New York, 2008, 4(2011), 4 vom: 27. Mai |
---|---|
Übergeordnetes Werk: |
volume:4 ; year:2011 ; number:4 ; day:27 ; month:05 |
Links: |
---|
DOI / URN: |
10.1007/s12198-011-0073-4 |
---|
Katalog-ID: |
SPR025194682 |
---|
LEADER | 01000caa a22002652 4500 | ||
---|---|---|---|
001 | SPR025194682 | ||
003 | DE-627 | ||
005 | 20230403064159.0 | ||
007 | cr uuu---uuuuu | ||
008 | 201007s2011 xx |||||o 00| ||eng c | ||
024 | 7 | |a 10.1007/s12198-011-0073-4 |2 doi | |
035 | |a (DE-627)SPR025194682 | ||
035 | |a (SPR)s12198-011-0073-4-e | ||
040 | |a DE-627 |b ger |c DE-627 |e rakwb | ||
041 | |a eng | ||
100 | 1 | |a Psarros, George Ad. |e verfasserin |4 aut | |
245 | 1 | 0 | |a On the success rates of maritime piracy attacks |
264 | 1 | |c 2011 | |
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a © Springer Science + Business Media, LLC 2011 | ||
520 | |a Abstract Today, modern pirates operate both in ports and on the open sea and use state-of-the-art equipment. Their crimes range from simple robbery to murder and hijacking of entire ships for ransom demand. It is the purpose of this paper to investigate the modern piracy trends and the effect of preventive actions taken by the crew of the attacked vessels. By analysing the available statistical material from the International Maritime Organization’s (IMO) monthly piracy reports during the period 2000–2009, it is shown that the attack rates on specific vessel segments and the recorded incidents for each geographical area develop their own trends. Incidents off and around the African continent have resulted to fewer deaths as compared to those in South China Sea and Malacca strait indicating that this area is dominated by more violent attacks against seafarers. However, the African attacks have bigger threatening potential in terms of the weapons used, whereas the inclusion of light weaponry in Asian attacks characterises them ancestors of historical piracy. Over the 10-year investigation period, a shift is observed from acts of robbery to acts of hostage taking and hijacking particularly around and off the East African coast. Estimates of the probability of an attack are provided through logistic regression modelling indicating that the success rate decreases with vessel size. It is also shown that the attacks are emphasised on specific vessel types for example chemical and oil tankers. The importance of a heightened vigilant crew in reducing the probability of a successful attack is pointed out by the analysis’ results. It is found that pirates are aiming at successful attacks regardless of their tactics and the success rate becomes higher as the pirates’ capability is improved. Additionally, the success probability of an attack is decreased as the act’s difficulty is increased, i.e. less success for hijacking rather than robbery. | ||
650 | 4 | |a Maritime security and piracy |7 (dpeaa)DE-He213 | |
650 | 4 | |a Merchant ships |7 (dpeaa)DE-He213 | |
650 | 4 | |a Attack probability |7 (dpeaa)DE-He213 | |
650 | 4 | |a Piracy success rate |7 (dpeaa)DE-He213 | |
650 | 4 | |a Piracy modus and capability |7 (dpeaa)DE-He213 | |
650 | 4 | |a Logistic regression |7 (dpeaa)DE-He213 | |
700 | 1 | |a Christiansen, Alexander F. |4 aut | |
700 | 1 | |a Skjong, Rolf |4 aut | |
700 | 1 | |a Gravir, Gjermund |4 aut | |
773 | 0 | 8 | |i Enthalten in |t Journal of transportation security |d New York, NY : Springer New York, 2008 |g 4(2011), 4 vom: 27. Mai |w (DE-627)575172355 |w (DE-600)2446031-X |x 1938-775X |7 nnns |
773 | 1 | 8 | |g volume:4 |g year:2011 |g number:4 |g day:27 |g month:05 |
856 | 4 | 0 | |u https://dx.doi.org/10.1007/s12198-011-0073-4 |z lizenzpflichtig |3 Volltext |
912 | |a GBV_USEFLAG_A | ||
912 | |a SYSFLAG_A | ||
912 | |a GBV_SPRINGER | ||
912 | |a GBV_ILN_11 | ||
912 | |a GBV_ILN_20 | ||
912 | |a GBV_ILN_22 | ||
912 | |a GBV_ILN_23 | ||
912 | |a GBV_ILN_24 | ||
912 | |a GBV_ILN_26 | ||
912 | |a GBV_ILN_31 | ||
912 | |a GBV_ILN_32 | ||
912 | |a GBV_ILN_39 | ||
912 | |a GBV_ILN_40 | ||
912 | |a GBV_ILN_60 | ||
912 | |a GBV_ILN_62 | ||
912 | |a GBV_ILN_63 | ||
912 | |a GBV_ILN_65 | ||
912 | |a GBV_ILN_69 | ||
912 | |a GBV_ILN_70 | ||
912 | |a GBV_ILN_73 | ||
912 | |a GBV_ILN_74 | ||
912 | |a GBV_ILN_90 | ||
912 | |a GBV_ILN_95 | ||
912 | |a GBV_ILN_100 | ||
912 | |a GBV_ILN_105 | ||
912 | |a GBV_ILN_110 | ||
912 | |a GBV_ILN_120 | ||
912 | |a GBV_ILN_138 | ||
912 | |a GBV_ILN_150 | ||
912 | |a GBV_ILN_151 | ||
912 | |a GBV_ILN_161 | ||
912 | |a GBV_ILN_170 | ||
912 | |a GBV_ILN_171 | ||
912 | |a GBV_ILN_184 | ||
912 | |a GBV_ILN_187 | ||
912 | |a GBV_ILN_213 | ||
912 | |a GBV_ILN_224 | ||
912 | |a GBV_ILN_230 | ||
912 | |a GBV_ILN_250 | ||
912 | |a GBV_ILN_281 | ||
912 | |a GBV_ILN_285 | ||
912 | |a GBV_ILN_293 | ||
912 | |a GBV_ILN_370 | ||
912 | |a GBV_ILN_602 | ||
912 | |a GBV_ILN_636 | ||
912 | |a GBV_ILN_702 | ||
912 | |a GBV_ILN_2001 | ||
912 | |a GBV_ILN_2003 | ||
912 | |a GBV_ILN_2004 | ||
912 | |a GBV_ILN_2005 | ||
912 | |a GBV_ILN_2006 | ||
912 | |a GBV_ILN_2007 | ||
912 | |a GBV_ILN_2008 | ||
912 | |a GBV_ILN_2009 | ||
912 | |a GBV_ILN_2010 | ||
912 | |a GBV_ILN_2011 | ||
912 | |a GBV_ILN_2014 | ||
912 | |a GBV_ILN_2015 | ||
912 | |a GBV_ILN_2020 | ||
912 | |a GBV_ILN_2021 | ||
912 | |a GBV_ILN_2025 | ||
912 | |a GBV_ILN_2026 | ||
912 | |a GBV_ILN_2027 | ||
912 | |a GBV_ILN_2031 | ||
912 | |a GBV_ILN_2034 | ||
912 | |a GBV_ILN_2037 | ||
912 | |a GBV_ILN_2038 | ||
912 | |a GBV_ILN_2039 | ||
912 | |a GBV_ILN_2044 | ||
912 | |a GBV_ILN_2048 | ||
912 | |a GBV_ILN_2049 | ||
912 | |a GBV_ILN_2050 | ||
912 | |a GBV_ILN_2055 | ||
912 | |a GBV_ILN_2057 | ||
912 | |a GBV_ILN_2059 | ||
912 | |a GBV_ILN_2061 | ||
912 | |a GBV_ILN_2064 | ||
912 | |a GBV_ILN_2065 | ||
912 | |a GBV_ILN_2068 | ||
912 | |a GBV_ILN_2070 | ||
912 | |a GBV_ILN_2086 | ||
912 | |a GBV_ILN_2088 | ||
912 | |a GBV_ILN_2093 | ||
912 | |a GBV_ILN_2106 | ||
912 | |a GBV_ILN_2107 | ||
912 | |a GBV_ILN_2108 | ||
912 | |a GBV_ILN_2110 | ||
912 | |a GBV_ILN_2111 | ||
912 | |a GBV_ILN_2112 | ||
912 | |a GBV_ILN_2113 | ||
912 | |a GBV_ILN_2116 | ||
912 | |a GBV_ILN_2118 | ||
912 | |a GBV_ILN_2119 | ||
912 | |a GBV_ILN_2122 | ||
912 | |a GBV_ILN_2129 | ||
912 | |a GBV_ILN_2143 | ||
912 | |a GBV_ILN_2144 | ||
912 | |a GBV_ILN_2147 | ||
912 | |a GBV_ILN_2148 | ||
912 | |a GBV_ILN_2152 | ||
912 | |a GBV_ILN_2153 | ||
912 | |a GBV_ILN_2188 | ||
912 | |a GBV_ILN_2190 | ||
912 | |a GBV_ILN_2232 | ||
912 | |a GBV_ILN_2336 | ||
912 | |a GBV_ILN_2446 | ||
912 | |a GBV_ILN_2470 | ||
912 | |a GBV_ILN_2472 | ||
912 | |a GBV_ILN_2507 | ||
912 | |a GBV_ILN_2522 | ||
912 | |a GBV_ILN_2548 | ||
912 | |a GBV_ILN_4035 | ||
912 | |a GBV_ILN_4037 | ||
912 | |a GBV_ILN_4046 | ||
912 | |a GBV_ILN_4112 | ||
912 | |a GBV_ILN_4125 | ||
912 | |a GBV_ILN_4126 | ||
912 | |a GBV_ILN_4242 | ||
912 | |a GBV_ILN_4246 | ||
912 | |a GBV_ILN_4249 | ||
912 | |a GBV_ILN_4251 | ||
912 | |a GBV_ILN_4305 | ||
912 | |a GBV_ILN_4306 | ||
912 | |a GBV_ILN_4307 | ||
912 | |a GBV_ILN_4313 | ||
912 | |a GBV_ILN_4322 | ||
912 | |a GBV_ILN_4323 | ||
912 | |a GBV_ILN_4324 | ||
912 | |a GBV_ILN_4325 | ||
912 | |a GBV_ILN_4326 | ||
912 | |a GBV_ILN_4333 | ||
912 | |a GBV_ILN_4334 | ||
912 | |a GBV_ILN_4335 | ||
912 | |a GBV_ILN_4336 | ||
912 | |a GBV_ILN_4338 | ||
912 | |a GBV_ILN_4393 | ||
912 | |a GBV_ILN_4700 | ||
951 | |a AR | ||
952 | |d 4 |j 2011 |e 4 |b 27 |c 05 |
author_variant |
g a p ga gap a f c af afc r s rs g g gg |
---|---|
matchkey_str |
article:1938775X:2011----::nhscesaeomrtmpr |
hierarchy_sort_str |
2011 |
publishDate |
2011 |
allfields |
10.1007/s12198-011-0073-4 doi (DE-627)SPR025194682 (SPR)s12198-011-0073-4-e DE-627 ger DE-627 rakwb eng Psarros, George Ad. verfasserin aut On the success rates of maritime piracy attacks 2011 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Springer Science + Business Media, LLC 2011 Abstract Today, modern pirates operate both in ports and on the open sea and use state-of-the-art equipment. Their crimes range from simple robbery to murder and hijacking of entire ships for ransom demand. It is the purpose of this paper to investigate the modern piracy trends and the effect of preventive actions taken by the crew of the attacked vessels. By analysing the available statistical material from the International Maritime Organization’s (IMO) monthly piracy reports during the period 2000–2009, it is shown that the attack rates on specific vessel segments and the recorded incidents for each geographical area develop their own trends. Incidents off and around the African continent have resulted to fewer deaths as compared to those in South China Sea and Malacca strait indicating that this area is dominated by more violent attacks against seafarers. However, the African attacks have bigger threatening potential in terms of the weapons used, whereas the inclusion of light weaponry in Asian attacks characterises them ancestors of historical piracy. Over the 10-year investigation period, a shift is observed from acts of robbery to acts of hostage taking and hijacking particularly around and off the East African coast. Estimates of the probability of an attack are provided through logistic regression modelling indicating that the success rate decreases with vessel size. It is also shown that the attacks are emphasised on specific vessel types for example chemical and oil tankers. The importance of a heightened vigilant crew in reducing the probability of a successful attack is pointed out by the analysis’ results. It is found that pirates are aiming at successful attacks regardless of their tactics and the success rate becomes higher as the pirates’ capability is improved. Additionally, the success probability of an attack is decreased as the act’s difficulty is increased, i.e. less success for hijacking rather than robbery. Maritime security and piracy (dpeaa)DE-He213 Merchant ships (dpeaa)DE-He213 Attack probability (dpeaa)DE-He213 Piracy success rate (dpeaa)DE-He213 Piracy modus and capability (dpeaa)DE-He213 Logistic regression (dpeaa)DE-He213 Christiansen, Alexander F. aut Skjong, Rolf aut Gravir, Gjermund aut Enthalten in Journal of transportation security New York, NY : Springer New York, 2008 4(2011), 4 vom: 27. Mai (DE-627)575172355 (DE-600)2446031-X 1938-775X nnns volume:4 year:2011 number:4 day:27 month:05 https://dx.doi.org/10.1007/s12198-011-0073-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_26 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 4 2011 4 27 05 |
spelling |
10.1007/s12198-011-0073-4 doi (DE-627)SPR025194682 (SPR)s12198-011-0073-4-e DE-627 ger DE-627 rakwb eng Psarros, George Ad. verfasserin aut On the success rates of maritime piracy attacks 2011 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Springer Science + Business Media, LLC 2011 Abstract Today, modern pirates operate both in ports and on the open sea and use state-of-the-art equipment. Their crimes range from simple robbery to murder and hijacking of entire ships for ransom demand. It is the purpose of this paper to investigate the modern piracy trends and the effect of preventive actions taken by the crew of the attacked vessels. By analysing the available statistical material from the International Maritime Organization’s (IMO) monthly piracy reports during the period 2000–2009, it is shown that the attack rates on specific vessel segments and the recorded incidents for each geographical area develop their own trends. Incidents off and around the African continent have resulted to fewer deaths as compared to those in South China Sea and Malacca strait indicating that this area is dominated by more violent attacks against seafarers. However, the African attacks have bigger threatening potential in terms of the weapons used, whereas the inclusion of light weaponry in Asian attacks characterises them ancestors of historical piracy. Over the 10-year investigation period, a shift is observed from acts of robbery to acts of hostage taking and hijacking particularly around and off the East African coast. Estimates of the probability of an attack are provided through logistic regression modelling indicating that the success rate decreases with vessel size. It is also shown that the attacks are emphasised on specific vessel types for example chemical and oil tankers. The importance of a heightened vigilant crew in reducing the probability of a successful attack is pointed out by the analysis’ results. It is found that pirates are aiming at successful attacks regardless of their tactics and the success rate becomes higher as the pirates’ capability is improved. Additionally, the success probability of an attack is decreased as the act’s difficulty is increased, i.e. less success for hijacking rather than robbery. Maritime security and piracy (dpeaa)DE-He213 Merchant ships (dpeaa)DE-He213 Attack probability (dpeaa)DE-He213 Piracy success rate (dpeaa)DE-He213 Piracy modus and capability (dpeaa)DE-He213 Logistic regression (dpeaa)DE-He213 Christiansen, Alexander F. aut Skjong, Rolf aut Gravir, Gjermund aut Enthalten in Journal of transportation security New York, NY : Springer New York, 2008 4(2011), 4 vom: 27. Mai (DE-627)575172355 (DE-600)2446031-X 1938-775X nnns volume:4 year:2011 number:4 day:27 month:05 https://dx.doi.org/10.1007/s12198-011-0073-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_26 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 4 2011 4 27 05 |
allfields_unstemmed |
10.1007/s12198-011-0073-4 doi (DE-627)SPR025194682 (SPR)s12198-011-0073-4-e DE-627 ger DE-627 rakwb eng Psarros, George Ad. verfasserin aut On the success rates of maritime piracy attacks 2011 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Springer Science + Business Media, LLC 2011 Abstract Today, modern pirates operate both in ports and on the open sea and use state-of-the-art equipment. Their crimes range from simple robbery to murder and hijacking of entire ships for ransom demand. It is the purpose of this paper to investigate the modern piracy trends and the effect of preventive actions taken by the crew of the attacked vessels. By analysing the available statistical material from the International Maritime Organization’s (IMO) monthly piracy reports during the period 2000–2009, it is shown that the attack rates on specific vessel segments and the recorded incidents for each geographical area develop their own trends. Incidents off and around the African continent have resulted to fewer deaths as compared to those in South China Sea and Malacca strait indicating that this area is dominated by more violent attacks against seafarers. However, the African attacks have bigger threatening potential in terms of the weapons used, whereas the inclusion of light weaponry in Asian attacks characterises them ancestors of historical piracy. Over the 10-year investigation period, a shift is observed from acts of robbery to acts of hostage taking and hijacking particularly around and off the East African coast. Estimates of the probability of an attack are provided through logistic regression modelling indicating that the success rate decreases with vessel size. It is also shown that the attacks are emphasised on specific vessel types for example chemical and oil tankers. The importance of a heightened vigilant crew in reducing the probability of a successful attack is pointed out by the analysis’ results. It is found that pirates are aiming at successful attacks regardless of their tactics and the success rate becomes higher as the pirates’ capability is improved. Additionally, the success probability of an attack is decreased as the act’s difficulty is increased, i.e. less success for hijacking rather than robbery. Maritime security and piracy (dpeaa)DE-He213 Merchant ships (dpeaa)DE-He213 Attack probability (dpeaa)DE-He213 Piracy success rate (dpeaa)DE-He213 Piracy modus and capability (dpeaa)DE-He213 Logistic regression (dpeaa)DE-He213 Christiansen, Alexander F. aut Skjong, Rolf aut Gravir, Gjermund aut Enthalten in Journal of transportation security New York, NY : Springer New York, 2008 4(2011), 4 vom: 27. Mai (DE-627)575172355 (DE-600)2446031-X 1938-775X nnns volume:4 year:2011 number:4 day:27 month:05 https://dx.doi.org/10.1007/s12198-011-0073-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_26 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 4 2011 4 27 05 |
allfieldsGer |
10.1007/s12198-011-0073-4 doi (DE-627)SPR025194682 (SPR)s12198-011-0073-4-e DE-627 ger DE-627 rakwb eng Psarros, George Ad. verfasserin aut On the success rates of maritime piracy attacks 2011 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Springer Science + Business Media, LLC 2011 Abstract Today, modern pirates operate both in ports and on the open sea and use state-of-the-art equipment. Their crimes range from simple robbery to murder and hijacking of entire ships for ransom demand. It is the purpose of this paper to investigate the modern piracy trends and the effect of preventive actions taken by the crew of the attacked vessels. By analysing the available statistical material from the International Maritime Organization’s (IMO) monthly piracy reports during the period 2000–2009, it is shown that the attack rates on specific vessel segments and the recorded incidents for each geographical area develop their own trends. Incidents off and around the African continent have resulted to fewer deaths as compared to those in South China Sea and Malacca strait indicating that this area is dominated by more violent attacks against seafarers. However, the African attacks have bigger threatening potential in terms of the weapons used, whereas the inclusion of light weaponry in Asian attacks characterises them ancestors of historical piracy. Over the 10-year investigation period, a shift is observed from acts of robbery to acts of hostage taking and hijacking particularly around and off the East African coast. Estimates of the probability of an attack are provided through logistic regression modelling indicating that the success rate decreases with vessel size. It is also shown that the attacks are emphasised on specific vessel types for example chemical and oil tankers. The importance of a heightened vigilant crew in reducing the probability of a successful attack is pointed out by the analysis’ results. It is found that pirates are aiming at successful attacks regardless of their tactics and the success rate becomes higher as the pirates’ capability is improved. Additionally, the success probability of an attack is decreased as the act’s difficulty is increased, i.e. less success for hijacking rather than robbery. Maritime security and piracy (dpeaa)DE-He213 Merchant ships (dpeaa)DE-He213 Attack probability (dpeaa)DE-He213 Piracy success rate (dpeaa)DE-He213 Piracy modus and capability (dpeaa)DE-He213 Logistic regression (dpeaa)DE-He213 Christiansen, Alexander F. aut Skjong, Rolf aut Gravir, Gjermund aut Enthalten in Journal of transportation security New York, NY : Springer New York, 2008 4(2011), 4 vom: 27. Mai (DE-627)575172355 (DE-600)2446031-X 1938-775X nnns volume:4 year:2011 number:4 day:27 month:05 https://dx.doi.org/10.1007/s12198-011-0073-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_26 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 4 2011 4 27 05 |
allfieldsSound |
10.1007/s12198-011-0073-4 doi (DE-627)SPR025194682 (SPR)s12198-011-0073-4-e DE-627 ger DE-627 rakwb eng Psarros, George Ad. verfasserin aut On the success rates of maritime piracy attacks 2011 Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier © Springer Science + Business Media, LLC 2011 Abstract Today, modern pirates operate both in ports and on the open sea and use state-of-the-art equipment. Their crimes range from simple robbery to murder and hijacking of entire ships for ransom demand. It is the purpose of this paper to investigate the modern piracy trends and the effect of preventive actions taken by the crew of the attacked vessels. By analysing the available statistical material from the International Maritime Organization’s (IMO) monthly piracy reports during the period 2000–2009, it is shown that the attack rates on specific vessel segments and the recorded incidents for each geographical area develop their own trends. Incidents off and around the African continent have resulted to fewer deaths as compared to those in South China Sea and Malacca strait indicating that this area is dominated by more violent attacks against seafarers. However, the African attacks have bigger threatening potential in terms of the weapons used, whereas the inclusion of light weaponry in Asian attacks characterises them ancestors of historical piracy. Over the 10-year investigation period, a shift is observed from acts of robbery to acts of hostage taking and hijacking particularly around and off the East African coast. Estimates of the probability of an attack are provided through logistic regression modelling indicating that the success rate decreases with vessel size. It is also shown that the attacks are emphasised on specific vessel types for example chemical and oil tankers. The importance of a heightened vigilant crew in reducing the probability of a successful attack is pointed out by the analysis’ results. It is found that pirates are aiming at successful attacks regardless of their tactics and the success rate becomes higher as the pirates’ capability is improved. Additionally, the success probability of an attack is decreased as the act’s difficulty is increased, i.e. less success for hijacking rather than robbery. Maritime security and piracy (dpeaa)DE-He213 Merchant ships (dpeaa)DE-He213 Attack probability (dpeaa)DE-He213 Piracy success rate (dpeaa)DE-He213 Piracy modus and capability (dpeaa)DE-He213 Logistic regression (dpeaa)DE-He213 Christiansen, Alexander F. aut Skjong, Rolf aut Gravir, Gjermund aut Enthalten in Journal of transportation security New York, NY : Springer New York, 2008 4(2011), 4 vom: 27. Mai (DE-627)575172355 (DE-600)2446031-X 1938-775X nnns volume:4 year:2011 number:4 day:27 month:05 https://dx.doi.org/10.1007/s12198-011-0073-4 lizenzpflichtig Volltext GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_26 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 AR 4 2011 4 27 05 |
language |
English |
source |
Enthalten in Journal of transportation security 4(2011), 4 vom: 27. Mai volume:4 year:2011 number:4 day:27 month:05 |
sourceStr |
Enthalten in Journal of transportation security 4(2011), 4 vom: 27. Mai volume:4 year:2011 number:4 day:27 month:05 |
format_phy_str_mv |
Article |
institution |
findex.gbv.de |
topic_facet |
Maritime security and piracy Merchant ships Attack probability Piracy success rate Piracy modus and capability Logistic regression |
isfreeaccess_bool |
false |
container_title |
Journal of transportation security |
authorswithroles_txt_mv |
Psarros, George Ad. @@aut@@ Christiansen, Alexander F. @@aut@@ Skjong, Rolf @@aut@@ Gravir, Gjermund @@aut@@ |
publishDateDaySort_date |
2011-05-27T00:00:00Z |
hierarchy_top_id |
575172355 |
id |
SPR025194682 |
language_de |
englisch |
fullrecord |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR025194682</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230403064159.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201007s2011 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s12198-011-0073-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR025194682</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s12198-011-0073-4-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Psarros, George Ad.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">On the success rates of maritime piracy attacks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2011</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science + Business Media, LLC 2011</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Today, modern pirates operate both in ports and on the open sea and use state-of-the-art equipment. Their crimes range from simple robbery to murder and hijacking of entire ships for ransom demand. It is the purpose of this paper to investigate the modern piracy trends and the effect of preventive actions taken by the crew of the attacked vessels. By analysing the available statistical material from the International Maritime Organization’s (IMO) monthly piracy reports during the period 2000–2009, it is shown that the attack rates on specific vessel segments and the recorded incidents for each geographical area develop their own trends. Incidents off and around the African continent have resulted to fewer deaths as compared to those in South China Sea and Malacca strait indicating that this area is dominated by more violent attacks against seafarers. However, the African attacks have bigger threatening potential in terms of the weapons used, whereas the inclusion of light weaponry in Asian attacks characterises them ancestors of historical piracy. Over the 10-year investigation period, a shift is observed from acts of robbery to acts of hostage taking and hijacking particularly around and off the East African coast. Estimates of the probability of an attack are provided through logistic regression modelling indicating that the success rate decreases with vessel size. It is also shown that the attacks are emphasised on specific vessel types for example chemical and oil tankers. The importance of a heightened vigilant crew in reducing the probability of a successful attack is pointed out by the analysis’ results. It is found that pirates are aiming at successful attacks regardless of their tactics and the success rate becomes higher as the pirates’ capability is improved. Additionally, the success probability of an attack is decreased as the act’s difficulty is increased, i.e. less success for hijacking rather than robbery.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Maritime security and piracy</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Merchant ships</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Attack probability</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piracy success rate</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piracy modus and capability</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logistic regression</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Christiansen, Alexander F.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Skjong, Rolf</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gravir, Gjermund</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of transportation security</subfield><subfield code="d">New York, NY : Springer New York, 2008</subfield><subfield code="g">4(2011), 4 vom: 27. Mai</subfield><subfield code="w">(DE-627)575172355</subfield><subfield code="w">(DE-600)2446031-X</subfield><subfield code="x">1938-775X</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:4</subfield><subfield code="g">year:2011</subfield><subfield code="g">number:4</subfield><subfield code="g">day:27</subfield><subfield code="g">month:05</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s12198-011-0073-4</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_26</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_138</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_171</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_184</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_250</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_281</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_636</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2031</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2038</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2039</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2057</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2065</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2068</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2070</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2086</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2088</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2093</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2106</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2107</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2108</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2113</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2116</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2118</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2119</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2144</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2147</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2148</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2188</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2446</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2472</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2522</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2548</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4246</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4334</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">4</subfield><subfield code="j">2011</subfield><subfield code="e">4</subfield><subfield code="b">27</subfield><subfield code="c">05</subfield></datafield></record></collection>
|
author |
Psarros, George Ad. |
spellingShingle |
Psarros, George Ad. misc Maritime security and piracy misc Merchant ships misc Attack probability misc Piracy success rate misc Piracy modus and capability misc Logistic regression On the success rates of maritime piracy attacks |
authorStr |
Psarros, George Ad. |
ppnlink_with_tag_str_mv |
@@773@@(DE-627)575172355 |
format |
electronic Article |
delete_txt_mv |
keep |
author_role |
aut aut aut aut |
collection |
springer |
remote_str |
true |
illustrated |
Not Illustrated |
issn |
1938-775X |
topic_title |
On the success rates of maritime piracy attacks Maritime security and piracy (dpeaa)DE-He213 Merchant ships (dpeaa)DE-He213 Attack probability (dpeaa)DE-He213 Piracy success rate (dpeaa)DE-He213 Piracy modus and capability (dpeaa)DE-He213 Logistic regression (dpeaa)DE-He213 |
topic |
misc Maritime security and piracy misc Merchant ships misc Attack probability misc Piracy success rate misc Piracy modus and capability misc Logistic regression |
topic_unstemmed |
misc Maritime security and piracy misc Merchant ships misc Attack probability misc Piracy success rate misc Piracy modus and capability misc Logistic regression |
topic_browse |
misc Maritime security and piracy misc Merchant ships misc Attack probability misc Piracy success rate misc Piracy modus and capability misc Logistic regression |
format_facet |
Elektronische Aufsätze Aufsätze Elektronische Ressource |
format_main_str_mv |
Text Zeitschrift/Artikel |
carriertype_str_mv |
cr |
hierarchy_parent_title |
Journal of transportation security |
hierarchy_parent_id |
575172355 |
hierarchy_top_title |
Journal of transportation security |
isfreeaccess_txt |
false |
familylinks_str_mv |
(DE-627)575172355 (DE-600)2446031-X |
title |
On the success rates of maritime piracy attacks |
ctrlnum |
(DE-627)SPR025194682 (SPR)s12198-011-0073-4-e |
title_full |
On the success rates of maritime piracy attacks |
author_sort |
Psarros, George Ad. |
journal |
Journal of transportation security |
journalStr |
Journal of transportation security |
lang_code |
eng |
isOA_bool |
false |
recordtype |
marc |
publishDateSort |
2011 |
contenttype_str_mv |
txt |
author_browse |
Psarros, George Ad. Christiansen, Alexander F. Skjong, Rolf Gravir, Gjermund |
container_volume |
4 |
format_se |
Elektronische Aufsätze |
author-letter |
Psarros, George Ad. |
doi_str_mv |
10.1007/s12198-011-0073-4 |
title_sort |
on the success rates of maritime piracy attacks |
title_auth |
On the success rates of maritime piracy attacks |
abstract |
Abstract Today, modern pirates operate both in ports and on the open sea and use state-of-the-art equipment. Their crimes range from simple robbery to murder and hijacking of entire ships for ransom demand. It is the purpose of this paper to investigate the modern piracy trends and the effect of preventive actions taken by the crew of the attacked vessels. By analysing the available statistical material from the International Maritime Organization’s (IMO) monthly piracy reports during the period 2000–2009, it is shown that the attack rates on specific vessel segments and the recorded incidents for each geographical area develop their own trends. Incidents off and around the African continent have resulted to fewer deaths as compared to those in South China Sea and Malacca strait indicating that this area is dominated by more violent attacks against seafarers. However, the African attacks have bigger threatening potential in terms of the weapons used, whereas the inclusion of light weaponry in Asian attacks characterises them ancestors of historical piracy. Over the 10-year investigation period, a shift is observed from acts of robbery to acts of hostage taking and hijacking particularly around and off the East African coast. Estimates of the probability of an attack are provided through logistic regression modelling indicating that the success rate decreases with vessel size. It is also shown that the attacks are emphasised on specific vessel types for example chemical and oil tankers. The importance of a heightened vigilant crew in reducing the probability of a successful attack is pointed out by the analysis’ results. It is found that pirates are aiming at successful attacks regardless of their tactics and the success rate becomes higher as the pirates’ capability is improved. Additionally, the success probability of an attack is decreased as the act’s difficulty is increased, i.e. less success for hijacking rather than robbery. © Springer Science + Business Media, LLC 2011 |
abstractGer |
Abstract Today, modern pirates operate both in ports and on the open sea and use state-of-the-art equipment. Their crimes range from simple robbery to murder and hijacking of entire ships for ransom demand. It is the purpose of this paper to investigate the modern piracy trends and the effect of preventive actions taken by the crew of the attacked vessels. By analysing the available statistical material from the International Maritime Organization’s (IMO) monthly piracy reports during the period 2000–2009, it is shown that the attack rates on specific vessel segments and the recorded incidents for each geographical area develop their own trends. Incidents off and around the African continent have resulted to fewer deaths as compared to those in South China Sea and Malacca strait indicating that this area is dominated by more violent attacks against seafarers. However, the African attacks have bigger threatening potential in terms of the weapons used, whereas the inclusion of light weaponry in Asian attacks characterises them ancestors of historical piracy. Over the 10-year investigation period, a shift is observed from acts of robbery to acts of hostage taking and hijacking particularly around and off the East African coast. Estimates of the probability of an attack are provided through logistic regression modelling indicating that the success rate decreases with vessel size. It is also shown that the attacks are emphasised on specific vessel types for example chemical and oil tankers. The importance of a heightened vigilant crew in reducing the probability of a successful attack is pointed out by the analysis’ results. It is found that pirates are aiming at successful attacks regardless of their tactics and the success rate becomes higher as the pirates’ capability is improved. Additionally, the success probability of an attack is decreased as the act’s difficulty is increased, i.e. less success for hijacking rather than robbery. © Springer Science + Business Media, LLC 2011 |
abstract_unstemmed |
Abstract Today, modern pirates operate both in ports and on the open sea and use state-of-the-art equipment. Their crimes range from simple robbery to murder and hijacking of entire ships for ransom demand. It is the purpose of this paper to investigate the modern piracy trends and the effect of preventive actions taken by the crew of the attacked vessels. By analysing the available statistical material from the International Maritime Organization’s (IMO) monthly piracy reports during the period 2000–2009, it is shown that the attack rates on specific vessel segments and the recorded incidents for each geographical area develop their own trends. Incidents off and around the African continent have resulted to fewer deaths as compared to those in South China Sea and Malacca strait indicating that this area is dominated by more violent attacks against seafarers. However, the African attacks have bigger threatening potential in terms of the weapons used, whereas the inclusion of light weaponry in Asian attacks characterises them ancestors of historical piracy. Over the 10-year investigation period, a shift is observed from acts of robbery to acts of hostage taking and hijacking particularly around and off the East African coast. Estimates of the probability of an attack are provided through logistic regression modelling indicating that the success rate decreases with vessel size. It is also shown that the attacks are emphasised on specific vessel types for example chemical and oil tankers. The importance of a heightened vigilant crew in reducing the probability of a successful attack is pointed out by the analysis’ results. It is found that pirates are aiming at successful attacks regardless of their tactics and the success rate becomes higher as the pirates’ capability is improved. Additionally, the success probability of an attack is decreased as the act’s difficulty is increased, i.e. less success for hijacking rather than robbery. © Springer Science + Business Media, LLC 2011 |
collection_details |
GBV_USEFLAG_A SYSFLAG_A GBV_SPRINGER GBV_ILN_11 GBV_ILN_20 GBV_ILN_22 GBV_ILN_23 GBV_ILN_24 GBV_ILN_26 GBV_ILN_31 GBV_ILN_32 GBV_ILN_39 GBV_ILN_40 GBV_ILN_60 GBV_ILN_62 GBV_ILN_63 GBV_ILN_65 GBV_ILN_69 GBV_ILN_70 GBV_ILN_73 GBV_ILN_74 GBV_ILN_90 GBV_ILN_95 GBV_ILN_100 GBV_ILN_105 GBV_ILN_110 GBV_ILN_120 GBV_ILN_138 GBV_ILN_150 GBV_ILN_151 GBV_ILN_161 GBV_ILN_170 GBV_ILN_171 GBV_ILN_184 GBV_ILN_187 GBV_ILN_213 GBV_ILN_224 GBV_ILN_230 GBV_ILN_250 GBV_ILN_281 GBV_ILN_285 GBV_ILN_293 GBV_ILN_370 GBV_ILN_602 GBV_ILN_636 GBV_ILN_702 GBV_ILN_2001 GBV_ILN_2003 GBV_ILN_2004 GBV_ILN_2005 GBV_ILN_2006 GBV_ILN_2007 GBV_ILN_2008 GBV_ILN_2009 GBV_ILN_2010 GBV_ILN_2011 GBV_ILN_2014 GBV_ILN_2015 GBV_ILN_2020 GBV_ILN_2021 GBV_ILN_2025 GBV_ILN_2026 GBV_ILN_2027 GBV_ILN_2031 GBV_ILN_2034 GBV_ILN_2037 GBV_ILN_2038 GBV_ILN_2039 GBV_ILN_2044 GBV_ILN_2048 GBV_ILN_2049 GBV_ILN_2050 GBV_ILN_2055 GBV_ILN_2057 GBV_ILN_2059 GBV_ILN_2061 GBV_ILN_2064 GBV_ILN_2065 GBV_ILN_2068 GBV_ILN_2070 GBV_ILN_2086 GBV_ILN_2088 GBV_ILN_2093 GBV_ILN_2106 GBV_ILN_2107 GBV_ILN_2108 GBV_ILN_2110 GBV_ILN_2111 GBV_ILN_2112 GBV_ILN_2113 GBV_ILN_2116 GBV_ILN_2118 GBV_ILN_2119 GBV_ILN_2122 GBV_ILN_2129 GBV_ILN_2143 GBV_ILN_2144 GBV_ILN_2147 GBV_ILN_2148 GBV_ILN_2152 GBV_ILN_2153 GBV_ILN_2188 GBV_ILN_2190 GBV_ILN_2232 GBV_ILN_2336 GBV_ILN_2446 GBV_ILN_2470 GBV_ILN_2472 GBV_ILN_2507 GBV_ILN_2522 GBV_ILN_2548 GBV_ILN_4035 GBV_ILN_4037 GBV_ILN_4046 GBV_ILN_4112 GBV_ILN_4125 GBV_ILN_4126 GBV_ILN_4242 GBV_ILN_4246 GBV_ILN_4249 GBV_ILN_4251 GBV_ILN_4305 GBV_ILN_4306 GBV_ILN_4307 GBV_ILN_4313 GBV_ILN_4322 GBV_ILN_4323 GBV_ILN_4324 GBV_ILN_4325 GBV_ILN_4326 GBV_ILN_4333 GBV_ILN_4334 GBV_ILN_4335 GBV_ILN_4336 GBV_ILN_4338 GBV_ILN_4393 GBV_ILN_4700 |
container_issue |
4 |
title_short |
On the success rates of maritime piracy attacks |
url |
https://dx.doi.org/10.1007/s12198-011-0073-4 |
remote_bool |
true |
author2 |
Christiansen, Alexander F. Skjong, Rolf Gravir, Gjermund |
author2Str |
Christiansen, Alexander F. Skjong, Rolf Gravir, Gjermund |
ppnlink |
575172355 |
mediatype_str_mv |
c |
isOA_txt |
false |
hochschulschrift_bool |
false |
doi_str |
10.1007/s12198-011-0073-4 |
up_date |
2024-07-03T14:28:39.067Z |
_version_ |
1803568460932841472 |
fullrecord_marcxml |
<?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>01000caa a22002652 4500</leader><controlfield tag="001">SPR025194682</controlfield><controlfield tag="003">DE-627</controlfield><controlfield tag="005">20230403064159.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">201007s2011 xx |||||o 00| ||eng c</controlfield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/s12198-011-0073-4</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627)SPR025194682</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(SPR)s12198-011-0073-4-e</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rakwb</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Psarros, George Ad.</subfield><subfield code="e">verfasserin</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">On the success rates of maritime piracy attacks</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="c">2011</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">© Springer Science + Business Media, LLC 2011</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Abstract Today, modern pirates operate both in ports and on the open sea and use state-of-the-art equipment. Their crimes range from simple robbery to murder and hijacking of entire ships for ransom demand. It is the purpose of this paper to investigate the modern piracy trends and the effect of preventive actions taken by the crew of the attacked vessels. By analysing the available statistical material from the International Maritime Organization’s (IMO) monthly piracy reports during the period 2000–2009, it is shown that the attack rates on specific vessel segments and the recorded incidents for each geographical area develop their own trends. Incidents off and around the African continent have resulted to fewer deaths as compared to those in South China Sea and Malacca strait indicating that this area is dominated by more violent attacks against seafarers. However, the African attacks have bigger threatening potential in terms of the weapons used, whereas the inclusion of light weaponry in Asian attacks characterises them ancestors of historical piracy. Over the 10-year investigation period, a shift is observed from acts of robbery to acts of hostage taking and hijacking particularly around and off the East African coast. Estimates of the probability of an attack are provided through logistic regression modelling indicating that the success rate decreases with vessel size. It is also shown that the attacks are emphasised on specific vessel types for example chemical and oil tankers. The importance of a heightened vigilant crew in reducing the probability of a successful attack is pointed out by the analysis’ results. It is found that pirates are aiming at successful attacks regardless of their tactics and the success rate becomes higher as the pirates’ capability is improved. Additionally, the success probability of an attack is decreased as the act’s difficulty is increased, i.e. less success for hijacking rather than robbery.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Maritime security and piracy</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Merchant ships</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Attack probability</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piracy success rate</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Piracy modus and capability</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Logistic regression</subfield><subfield code="7">(dpeaa)DE-He213</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Christiansen, Alexander F.</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Skjong, Rolf</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gravir, Gjermund</subfield><subfield code="4">aut</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Enthalten in</subfield><subfield code="t">Journal of transportation security</subfield><subfield code="d">New York, NY : Springer New York, 2008</subfield><subfield code="g">4(2011), 4 vom: 27. Mai</subfield><subfield code="w">(DE-627)575172355</subfield><subfield code="w">(DE-600)2446031-X</subfield><subfield code="x">1938-775X</subfield><subfield code="7">nnns</subfield></datafield><datafield tag="773" ind1="1" ind2="8"><subfield code="g">volume:4</subfield><subfield code="g">year:2011</subfield><subfield code="g">number:4</subfield><subfield code="g">day:27</subfield><subfield code="g">month:05</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://dx.doi.org/10.1007/s12198-011-0073-4</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_USEFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">SYSFLAG_A</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_SPRINGER</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_11</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_20</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_22</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_23</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_24</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_26</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_31</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_32</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_39</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_40</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_60</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_62</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_63</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_65</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_69</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_70</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_73</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_74</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_90</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_95</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_100</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_105</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_120</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_138</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_150</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_151</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_161</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_170</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_171</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_184</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_187</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_213</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_224</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_230</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_250</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_281</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_285</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_293</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_370</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_602</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_636</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_702</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2001</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2003</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2004</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2005</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2006</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2007</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2008</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2009</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2010</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2011</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2014</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2015</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2025</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2026</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2027</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2031</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2034</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2038</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2039</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2044</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2048</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2049</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2050</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2055</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2057</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2059</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2061</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2064</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2065</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2068</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2070</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2086</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2088</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2093</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2106</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2107</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2108</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2110</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2111</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2113</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2116</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2118</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2119</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2122</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2129</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2143</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2144</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2147</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2148</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2152</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2153</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2188</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2190</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2232</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2446</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2470</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2472</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2507</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2522</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_2548</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4035</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4037</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4046</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4112</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4125</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4126</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4242</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4246</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4249</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4251</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4305</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4306</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4307</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4313</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4322</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4323</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4324</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4325</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4326</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4333</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4334</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4335</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4336</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4338</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4393</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV_ILN_4700</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">AR</subfield></datafield><datafield tag="952" ind1=" " ind2=" "><subfield code="d">4</subfield><subfield code="j">2011</subfield><subfield code="e">4</subfield><subfield code="b">27</subfield><subfield code="c">05</subfield></datafield></record></collection>
|
score |
7.40075 |