Prioritising security vulnerabilities in ports
by Zaili Yang; Adolf K.Y. Ng; Jin Wang
International Journal of Shipping and Transport Logistics (IJSTL), Vol. 5, No. 6, 2013

Abstract: Ports are exposed to various risks in their internal operations and external interactions with inland transport carriers and sea-going vessels within maritime logistics systems. While conventional safety management techniques may be capable of dealing with accidental, hazard-based risks in port, new vulnerability analysis methods are urgently required for tackling those caused by threats such as terrorist attacks. The motivation for identifying the vulnerabilities is the need for prioritising activities and resources on port security investments and risk reduction processes. This paper develops an advanced threat-based criticality analysis methodology designed for the identification and prioritisation of vulnerable port facilities under uncertainties. The model relies on the combination of fuzzy Bayesian reasoning and analytical hierarchy process (AHP) analysis in a complementary way so as to facilitate the treatment of uncertainty in data, thus realising effective quantitative analysis of the vulnerabilities under different threat modes in ports. The outcomes can be used either as a stand-alone technique for prioritising critical systems such as port facilitates with high values and significant functions or as part of an integrated decision making method for evaluating the effectiveness of security control options.

Online publication date: Tue, 10-Sep-2013

The full text of this article is only available to individual subscribers or to users at subscribing institutions.

Existing subscribers:
Go to Inderscience Online Journals to access the Full Text of this article.

Pay per view:
If you are not a subscriber and you just want to read the full contents of this article, buy online access here.

Complimentary Subscribers, Editors or Members of the Editorial Board of the International Journal of Shipping and Transport Logistics (IJSTL):
Login with your Inderscience username and password:

    Username:        Password:         

Forgotten your password?

Want to subscribe?
A subscription gives you complete access to all articles in the current issue, as well as to all articles in the previous three years (where applicable). See our Orders page to subscribe.

If you still need assistance, please email