Using portfolio optimisation to calculate the efficient relationship between maritime port security residual risk and security investment

The research employs an adaptive cross-disciplinary research strategy in an industrial example to address container port facilities’ inability to assess whether their security systems are efficient. The research combines subjective assessments of the performances of the port facilities’ security systems with estimates of terrorism risk from a specialist terrorism underwriter. The research constructs the optimum theoretical portfolio of the three different security systems (access control, biometrics and detection systems) drawn from six different container port facilities owned by a major international ports company to calculate the efficient relationship between maritime port security residual risk and security investment. The research builds on the existing literature and proposes new definitions of security, port security, port security risk and port security risk management. The research also highlights the managerial impact of a chief financial officer’s ability to assess the efficiency of security budget allocation through the residual risk – security investment ratio. The contribution which the research makes is in terms of modelling and measurement of the impact of the introduction of new port security technology and changes to background port security threat levels. The research also juxtaposes for the first time the performance of port security systems with estimates of terrorism risk from a specialist Lloyd’s terrorism underwriter.

[1]  Stuart Shapiro,et al.  The Benefit-Cost Analysis of Security Focused Regulations , 2009 .

[2]  J. R. Carter,et al.  An analysis of supply risk assessment techniques , 2004 .

[3]  Martin Christopher,et al.  Logistics and supply chain management : creating value-adding networks , 2005 .

[4]  Barry Buzan,et al.  People, states and fear: an agenda for international security studies in the post-Cold War era , 2007 .

[5]  Judith M. Whipple,et al.  Global supply chain design considerations: Mitigating product safety and security risks , 2011 .

[6]  D. Nincic The challenge of maritime terrorism: Threat identification, WMD and regime response , 2005 .

[7]  Henry H. Willis,et al.  Using Probabilistic Terrorism Risk Modeling for Regulatory Benefit‐Cost Analysis: Application to the Western Hemisphere Travel Initiative in the Land Environment , 2008, Risk analysis : an official publication of the Society for Risk Analysis.

[8]  W. Price REDUCING THE RISK OF TERROR EVENTS AT SEAPORTS , 2004 .

[9]  David A. Menachof,et al.  The efficient trade-off between security and cost for sea ports: a conceptual model , 2009 .

[10]  Jason E. Lueg,et al.  Supply chain security: an overview and research agenda , 2008 .

[11]  J. Lam,et al.  An interpretation of inter-container port relationships from the demand perspective , 2004 .

[12]  Md. Borhan Uddin,et al.  Selection of probability distribution for life testing data , 1991 .

[13]  William W. Lowrance,et al.  The Nature of Risk , 1980 .

[14]  J. Frank Yates,et al.  The risk construct. , 1992 .

[15]  Catherine Zara Raymond,et al.  Maritime Terrorism in Southeast Asia: A Risk Assessment , 2006 .

[16]  K. Bichou Security and Risk-Based Models in Shipping and Ports: Review and Critical Analysis , 2008 .

[17]  Thomas J. Goldsby,et al.  Supply chain risks: a review and typology , 2009 .

[18]  P. Martín Terrorism and Political Violence in Spain , 2008 .