Skip to main content
Top

2020 | OriginalPaper | Chapter

14. Connecting the Dots: Implications of the Intertwined Global Challenges to Maritime Security

Authors : Anja Menzel, Lisa Otto

Published in: Global Challenges in Maritime Security

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Scholars have long discussed the land-sea nexus in the context of maritime security, and indeed in the exploration of the issues and challenges contemplated throughout these pages, we note that in the same way that the sea and land are connected beyond the shoreline where they meet, there are likewise many intersections between the global challenges to maritime security. In this chapter five connecting themes are identified, which draw together the threads weaving through the chapters of this book, specifically: the transnational nature of maritime threats, the role played by territoriality, the blue security nexus, the contribution of non-state actors to the maritime domain, and, lastly, the impact of technological developments. Further to connecting these dots, we synthesise a number of policy recommendations that emanate from within the chapters of this volume. These centre on cooperation (particularly in capacity building and information-sharing), appreciating the role of geopolitics and actively acknowledging this through the necessary legal instruments, an integrated approach toward sea-based economic activity, the need for platforms where private and public stakeholders can come together to coalesce around solutions to key problems, and preparing for and leaning on the challenges and opportunities presented by technological advances. Distilled further from this is the importance of maritime domain awareness, as policy interventions at the state-, regional-, and international levels all require an accurate picture of what is happening in the maritime domain. Lastly, we look to the areas in which new research must focus, in order to further develop our understanding of the intertwining of these various issues, but also to provide actionable inputs into policy processes.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Allison EH, Bassett HR (2015) Climate change in the oceans: human impacts and responses. Science 350(6262):778–782CrossRef Allison EH, Bassett HR (2015) Climate change in the oceans: human impacts and responses. Science 350(6262):778–782CrossRef
go back to reference Bateman S (2017) Building cooperation for managing the South China Sea without strategic trust. Asia Pac Policy Stud 4(2):251–259CrossRef Bateman S (2017) Building cooperation for managing the South China Sea without strategic trust. Asia Pac Policy Stud 4(2):251–259CrossRef
go back to reference Bueger C (2014) Experimental governance: can the lessons of the CGPCS be transferred to other policy fields? In: Tardy T (ed) The Contact Group on Piracy off the Coast of Somalia (CGPCS). A lessons learnt compendium. EU Institute for Security Studies, Paris, pp 78–85 Bueger C (2014) Experimental governance: can the lessons of the CGPCS be transferred to other policy fields? In: Tardy T (ed) The Contact Group on Piracy off the Coast of Somalia (CGPCS). A lessons learnt compendium. EU Institute for Security Studies, Paris, pp 78–85
go back to reference Bueger C (2015b) Learning from piracy: future challenges of maritime security governance. Glob Aff 1(1):33–42CrossRef Bueger C (2015b) Learning from piracy: future challenges of maritime security governance. Glob Aff 1(1):33–42CrossRef
go back to reference Bueger C (2015c) From dusk to dawn? Maritime domain awareness in Southeast Asia. Contemp Southeast Asia 37(2):157–182CrossRef Bueger C (2015c) From dusk to dawn? Maritime domain awareness in Southeast Asia. Contemp Southeast Asia 37(2):157–182CrossRef
go back to reference Bueger C, Edmunds T (2017) Beyond seablindness: a new agenda for maritime security studies. Int Aff 93(6):1293–1311CrossRef Bueger C, Edmunds T (2017) Beyond seablindness: a new agenda for maritime security studies. Int Aff 93(6):1293–1311CrossRef
go back to reference Coggins BL (2012) Global patterns of maritime piracy, 2000–09. Introducing a new dataset. J Peace Res 49(4):605–617CrossRef Coggins BL (2012) Global patterns of maritime piracy, 2000–09. Introducing a new dataset. J Peace Res 49(4):605–617CrossRef
go back to reference Cullen P (2012) Surveying the market in maritime private security services. In: Cullen P, Berube C (eds) Maritime private security: market responses to piracy, terrorism and waterborne security risks in the 21st century. Routledge, New York, pp 45–57CrossRef Cullen P (2012) Surveying the market in maritime private security services. In: Cullen P, Berube C (eds) Maritime private security: market responses to piracy, terrorism and waterborne security risks in the 21st century. Routledge, New York, pp 45–57CrossRef
go back to reference Ford M, Lyons L (2013) Outsourcing border security: NGO involvement in the monitoring, processing and assistance of Indonesian nationals returning illegally by sea. Contemp Southeast Asia 35(2):215–234CrossRef Ford M, Lyons L (2013) Outsourcing border security: NGO involvement in the monitoring, processing and assistance of Indonesian nationals returning illegally by sea. Contemp Southeast Asia 35(2):215–234CrossRef
go back to reference Germond B (2015) The geopolitical dimension of maritime security. Mar Policy 54:137–142CrossRef Germond B (2015) The geopolitical dimension of maritime security. Mar Policy 54:137–142CrossRef
go back to reference Guilfoyle D (2013) Prosecuting pirates: the Contact Group on Piracy off the Coast of Somalia, governance and international law. Global Pol 4(1):73–79CrossRef Guilfoyle D (2013) Prosecuting pirates: the Contact Group on Piracy off the Coast of Somalia, governance and international law. Global Pol 4(1):73–79CrossRef
go back to reference Hallwood P (2014) Economics of the oceans. Rights, rents and resources. Routledge, New YorkCrossRef Hallwood P (2014) Economics of the oceans. Rights, rents and resources. Routledge, New YorkCrossRef
go back to reference Jensen L (2015) Challenges in maritime cyber-resilience. Technol Innov Manag Rev 5(4):35–39CrossRef Jensen L (2015) Challenges in maritime cyber-resilience. Technol Innov Manag Rev 5(4):35–39CrossRef
go back to reference Liss C (2011) Oceans of crime. Maritime piracy and transnational security in Southeast Asia and Bangladesh. Institute of Southeast Asian Studies, Singapore Liss C (2011) Oceans of crime. Maritime piracy and transnational security in Southeast Asia and Bangladesh. Institute of Southeast Asian Studies, Singapore
go back to reference Liss C (2013) New actors and the state: addressing maritime security threats in Southeast Asia. Contemp Southeast Asia 35(2):141–162CrossRef Liss C (2013) New actors and the state: addressing maritime security threats in Southeast Asia. Contemp Southeast Asia 35(2):141–162CrossRef
go back to reference Menzel A (2018) Institutional adoption and maritime crime governance: the Djibouti Code of Conduct. J Indian Ocean Reg 14(2):152–169CrossRef Menzel A (2018) Institutional adoption and maritime crime governance: the Djibouti Code of Conduct. J Indian Ocean Reg 14(2):152–169CrossRef
go back to reference Murphy M (2007) Piracy and UNCLOS: does international law help regional states combat piracy? In: Lehr P (ed) Violence at sea: piracy in the age of global terrorism. Routledge, London, pp 155–182 Murphy M (2007) Piracy and UNCLOS: does international law help regional states combat piracy? In: Lehr P (ed) Violence at sea: piracy in the age of global terrorism. Routledge, London, pp 155–182
go back to reference Okonkwo T (2017) Maritime boundaries delimitation and dispute resolution in Africa. Beijing Law Rev 8:55–78CrossRef Okonkwo T (2017) Maritime boundaries delimitation and dispute resolution in Africa. Beijing Law Rev 8:55–78CrossRef
go back to reference Otto L (2018) Defining maritime piracy: the problem with the law. Acta Criminologica: Southern African. J Criminol 31(2):134–148 Otto L (2018) Defining maritime piracy: the problem with the law. Acta Criminologica: Southern African. J Criminol 31(2):134–148
go back to reference Passas N, Twyman-Ghoshal A (2012) Controlling piracy in Southeast Asia – thinking outside the box. In: Beckman RC, Roach JA (eds) Piracy and international maritime crimes in ASEAN: prospects for cooperation. Edward Elgar Publishing, Cheltenham, pp 65–94 Passas N, Twyman-Ghoshal A (2012) Controlling piracy in Southeast Asia – thinking outside the box. In: Beckman RC, Roach JA (eds) Piracy and international maritime crimes in ASEAN: prospects for cooperation. Edward Elgar Publishing, Cheltenham, pp 65–94
go back to reference Roth B (2011) A call for mediated solutions to arctic region disputes. Cardozo J Int Comp L 19:851–896 Roth B (2011) A call for mediated solutions to arctic region disputes. Cardozo J Int Comp L 19:851–896
go back to reference Singh B (2018) Crime-terror Nexus in Southeast Asia: case study of the Abu Sayyaf Group. Counter Terror Trends Anal 10(9):6–10 Singh B (2018) Crime-terror Nexus in Southeast Asia: case study of the Abu Sayyaf Group. Counter Terror Trends Anal 10(9):6–10
go back to reference Storey I (2009) Maritime security in Southeast Asia. Two cheers for regional cooperation. In: Sing D (ed) Southeast Asian affairs 2009. Institute of Southeast Asian Studies, Singapore, pp 36–58 Storey I (2009) Maritime security in Southeast Asia. Two cheers for regional cooperation. In: Sing D (ed) Southeast Asian affairs 2009. Institute of Southeast Asian Studies, Singapore, pp 36–58
go back to reference Toonen HM, Bush SR (2018) The digital frontiers of fisheries governance: fish attraction devices, drones and satellites. J Environ Policy Plan:1–13 Toonen HM, Bush SR (2018) The digital frontiers of fisheries governance: fish attraction devices, drones and satellites. J Environ Policy Plan:1–13
go back to reference Treves T (2013) Piracy and the international law of the sea. In: Guilfoyle D (ed) Modern piracy. Legal challenges and responses. Edward Elgar Publishing, Cheltenham, pp 117–146 Treves T (2013) Piracy and the international law of the sea. In: Guilfoyle D (ed) Modern piracy. Legal challenges and responses. Edward Elgar Publishing, Cheltenham, pp 117–146
go back to reference United Nations (2000) Protocol against the smuggling of migrants by land, sea and air, supplementing the United Nations convention against transnational organized crime. New York United Nations (2000) Protocol against the smuggling of migrants by land, sea and air, supplementing the United Nations convention against transnational organized crime. New York
go back to reference Voyer M, Schofield C, Azmi K, Warner R, McIlgorm A, Quirk G (2018) Maritime security and the blue economy: intersections and interdependencies in the Indian Ocean. J Indian Ocean Reg 14(1):28–48CrossRef Voyer M, Schofield C, Azmi K, Warner R, McIlgorm A, Quirk G (2018) Maritime security and the blue economy: intersections and interdependencies in the Indian Ocean. J Indian Ocean Reg 14(1):28–48CrossRef
Metadata
Title
Connecting the Dots: Implications of the Intertwined Global Challenges to Maritime Security
Authors
Anja Menzel
Lisa Otto
Copyright Year
2020
Publisher
Springer International Publishing
DOI
https://doi.org/10.1007/978-3-030-34630-0_14