Skip to main content
Erschienen in: Journal of Transportation Security 3-4/2016

01.12.2016

Socioeconomic development and the risk of maritime piracy

verfasst von: Charles Okeahalam, Kennedy Otwombe

Erschienen in: Journal of Transportation Security | Ausgabe 3-4/2016

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Maritime piracy is a phenomenon with implications for international trade. It is usually of two types: armed robbery and hijacking of vessels. This paper uses general estimating equations (GEE) modelling to assess factors that determine the risk of piracy attacks. We consider the impact which the level of economic and institutional development in a number of regions may have on the frequency and success and failure rates of piracy attacks. We find that the frequency of piracy attacks is higher in regions where the quality of institutions is low and that most attacks take place in close proximity to a port. We also find that successful attacks are most likely in regions that are poor and have low military capacity. The success rate of the hijacking version of piracy has no effect on the probability of the armed robbery form of piracy. In the horn of Africa and South–East Asia, the probability of piracy attacks decreases during the month of Ramadan. While in the short-term, military responses may have a role to play, long-term sustainable policy requires that this is combined with enhancement of economic opportunity, governance and human capital development.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
A broadly similar pattern is found in the classification of airline hijackings, and Holden (1986) illustrates that the motivation for, and the probability of an attack, is influenced by the specific nature of attacks.
 
2
There is well established literature on the economic and security implications of airline hijackings, for example, Dugan et al. (2005). And although shipping piracy in the P-HV form is another type of hijacking, surprisingly similar literature is not well established. If ship piracy attacks are linked to terrorism objectives, they may corroborate the findings of Dugan et al. (2005) that increased security measures did not influence terrorist motivated hijacking attempts in the same way as non-terrorist motivated attempts. This may lead to enquiries to attempt to separate some forms of P-HV from terrorism.
 
3
A test of this discrepancy would be complex. Yet subject to data this could be assessed. Such an analysis would require inter-alia, marine insurance premiums for various markets/routes, a comparison of premium revenue and cost to marine insurance companies over time, total revenue derived from premiums relative to total costs of payments to shipping companies, aggregate marine insurance premium revenues over time/ annual pay-out costs made to shipping companies, and further data on premium revenue, disaggregated into premium revenue for piracy routes and premium revenue for non–piracy routes would be required. There would also be a need to consider cost to shipping companies. This would include data on aggregate insurance costs over time - annual premium costs paid by shipping companies over time – for piracy and non-piracy routes, and premium costs for piracy routes and non-piracy routes. Further granularity would be obtained by analysing these costs by ship size, type of cargo, value of cargo, flag of vessel, nationality of captain/crew etc and a comparison of Horn of Africa insurance and South-East Asia insurance premiums-where piracy is prevalent and insurance premiums where incidences of piracy are less. Also it is worth noting that in the P-HV version, the amount of ransom demanded and the amount actually paid are often misstated. Likewise in P-AR, the value of goods which the victims claim they are robbed of is often overstated for insurance claims or understated to avoid possible prosecution by authorities for fiscal and other violations. In sum, while it is an important issue to consider and is worthy of further enquiry, measuring the exact impact, costs, benefits and incentives of marine insurance is difficult without the data. The one industry which does not benefit from such a subsidy is marine insurance. Marine insurance is a key aspect of shipping operations and is affected by piracy. As with any commercial underwriter, the ship insurance underwriter makes an actuarial assessment of the maximum cost of a catastrophe and relates this to the probability of such an event taking place. The underwriter places as many safeguards and compliance requirements on the insured party as is possible, relative to the premium cost that the ship owner pays. Such requirements includes, routes which the ship may operate in ports it may call at, types of cargo it may carry, the minimum quality of the officers and crew and the quality of the charter party and ship manager. In the main, given the potential costs of catastrophe, a subsequent increase in the premium that would be due as a result of non-compliance with underwriting requirements is unlikely to be enough of an incentive for the underwriter to seek to benefit from piracy activity.
 
4
Such a situation enables a number of negative activities to take place which might be checked if democratic institutions and processes existed. Even where they are elected, the party in power stays in office for so long that the civil service and other arms of the constitutional system become co-opted. Individuals become substitutes for institutions at great cost to society at large. A key feature of such a system is that there is a large network of informers loyal to the key individual- this makes it highly unlikely that the head of state would be unaware (if only, for self-interest) of anything that has economic or security implications.
 
5
It is also possible that the frequency of attacks is not strongly correlated with the amount of revenue derived and such revenues derived from piracy activities are not expended in locations in close proximity to the attacks and so the level of imported goods and port activities, growth in capital stock and real estate demand and prices will receive no noticeable multiplier effects.
 
6
The forms of violence vary from threats of physical harm, gun-fire to deaths of a single crew member or murder of entire crew. The database highlights whether a particular incident is reported to a nearby coastal authority. Further, the database describes the nature of action taken by the particular coastal authority(ies) that receives the report. There are cases where private ships and warships in the vicinity respond to the attack; where these occur, such incidents are also captured.
 
7
Removing vessels without IMO numbers from the data would have reduced valuable observations, so instead they were allocated unique numbers with the assumption that they had only one attack.
 
8
The empirical analysis also considered univariate and multivariate logistic regression models and the results of these estimates are available from the authors.
 
9
Correlation plots and their fit statistics for economic and governance indicators are available upon request from the authors.
 
10
Other goodness of fit procedures for the logistic regression have been suggested by Tang (2001) amongst others.
 
11
We apply the exchangeable correlation structure that assumes the same correlation between vessels within the same cluster of attacks. See Fig. 1 with a homogeneous variance and constant correlation. This does not bias the parameter estimates since GEE parameter estimates are consistent as long as (6) is correctly modelled. \( \left[\begin{array}{ccccc}\hfill {\rho}^2\hfill & \hfill \rho \hfill & \hfill .\hfill & \hfill .\hfill & \hfill \rho \hfill \\ {}\hfill \rho \hfill & \hfill {\rho}^2\hfill & \hfill .\hfill & \hfill .\hfill & \hfill .\hfill \\ {}\hfill .\hfill & \hfill .\hfill & \hfill .\hfill & \hfill .\hfill & \hfill .\hfill \\ {}\hfill .\hfill & \hfill .\hfill & \hfill .\hfill & \hfill .\hfill & \hfill .\hfill \\ {}\hfill \rho \hfill & \hfill .\hfill & \hfill .\hfill & \hfill .\hfill & \hfill {\rho}^2\hfill \end{array}\right] \)
 
12
A logistic regression with random intercepts, an extension of the mixed model approach, popularly used to model non-normal data was also considered. However the specification of the conditional model and the distribution of random effects presented challenges given that the dependent variable is categorical. These challenges were overcome by specification of a GEE model.
 
13
The functional forms of the 5 multivariate GEE models vary. A GEE model is fitted in each of the regions and for the global data. Therefore there are 6 models per table multiplied by 5 tables which gives 30 models. Details on differences in the specification of the functional forms are available from the authors at www.​baragh.​com.
 
14
Tables of the results of models 1 and 4 are available and can be provided by the authors.
 
15
We had tried to consider the impact of military intervention more directly via the specification of a variable to measure naval capacity to prevent or apprehend pirates. The intervening naval capacity (INC) is naval capacity that is capable of providing a direct military response to a vessel attack. The INC variable is calibrated as the location of total military tonnage as a percentage of total available tonnage. The majority of INC is located in North America, Russia, China and Japan. Non-intervening Naval Capacity - NINC is naval capacity that is unable to respond directly to attacks outside of a port area. There might be a high correlation between NINC, low economic development and low institutional quality. In particular, it may be useful to consider whether the probability of piracy attack increases the further distance from the operational base of intervening naval capacity (INC), and the alternative hypothesis. So with appropriate data, we could test whether or not the probability of a piracy attack is influenced by INC. However the absence and sensitivity of the data made these tests unachievable.
 
16
The Kenyan economy is the largest in East Africa. However on a per capita basis the GDP of Djibouti is almost twice as high as that of Kenya, and almost three times higher than Somalia and Tanzania. The data indicates that Djibouti also has highest quality of governance. In the governance measures of control of corruption, rule of law, government effectiveness and political stability, Djibouti performs better that the rest of the countries with Somalia providing the worst outcomes. Net ODA is also lower for Djibouti compared to the rest of the countries.
 
17
An attempt was also made to assess whether unofficial flows from piracy can be discerned. The key focus was on Kenya – which is the regional financial centre. The avenues of enquiry were of two types. A direct approach involved attempting to obtain data on money transfers from Somalia and Djibouti. An indirect approach involved estimating the variance between official sources of mortgage and housing finance and the extent and level of development of housing and other capital stock. However the results proved spurious due to absence of detailed data.
 
Literatur
Zurück zum Zitat Acemoglu D, Egorov G, Sonin K (2010) Political Selection and Persistence of Bad Governments. Q J Econ 125:1511–1575CrossRef Acemoglu D, Egorov G, Sonin K (2010) Political Selection and Persistence of Bad Governments. Q J Econ 125:1511–1575CrossRef
Zurück zum Zitat Bendall HB (2010) Costs of Piracy: A Comparative Voyage Approach. Marit Econ Logist 12:178–195CrossRef Bendall HB (2010) Costs of Piracy: A Comparative Voyage Approach. Marit Econ Logist 12:178–195CrossRef
Zurück zum Zitat Cawthorne N (2003) History of Pirates: Blood and Thunder on the High Seas. ArcturusPublishing, London, UK Cawthorne N (2003) History of Pirates: Blood and Thunder on the High Seas. ArcturusPublishing, London, UK
Zurück zum Zitat Decker JH, Lim JJ (2008) What fundamentally drives growth? Revisiting the institutions and economic performance debate. J Int Dev 20:698–725CrossRef Decker JH, Lim JJ (2008) What fundamentally drives growth? Revisiting the institutions and economic performance debate. J Int Dev 20:698–725CrossRef
Zurück zum Zitat Dugan L, Lafree G, Piquero AR (2005) Testing a Rational Choice Model of Airline Hijackings. Criminology 43:1031–1065CrossRef Dugan L, Lafree G, Piquero AR (2005) Testing a Rational Choice Model of Airline Hijackings. Criminology 43:1031–1065CrossRef
Zurück zum Zitat Elleman BA, Forbes A, Rosenberg D (2012) Piracy and Maritime Crime: Historical and Modern Case Studies: Naval War College Press Newport Papers, Number 35 Elleman BA, Forbes A, Rosenberg D (2012) Piracy and Maritime Crime: Historical and Modern Case Studies: Naval War College Press Newport Papers, Number 35
Zurück zum Zitat Fu X, Ng AKY, Lau YY (2010) The Impacts of Maritime Piracy on Global Economic Development. Marit Policy Manag 37:677–697CrossRef Fu X, Ng AKY, Lau YY (2010) The Impacts of Maritime Piracy on Global Economic Development. Marit Policy Manag 37:677–697CrossRef
Zurück zum Zitat Gould ED, Klor EF (2010) Does Terrorism Work ? Q J Econ 125:1459–1510CrossRef Gould ED, Klor EF (2010) Does Terrorism Work ? Q J Econ 125:1459–1510CrossRef
Zurück zum Zitat Hastings JV (2009) Geographies of State Failure and Sophistication in Maritime Piracy Hijackings. Polit Geogr 28:213–214CrossRef Hastings JV (2009) Geographies of State Failure and Sophistication in Maritime Piracy Hijackings. Polit Geogr 28:213–214CrossRef
Zurück zum Zitat Helmick JS (2008) Port and Maritime Security: A Research Perspective. J Transp Secur 1:15–28CrossRef Helmick JS (2008) Port and Maritime Security: A Research Perspective. J Transp Secur 1:15–28CrossRef
Zurück zum Zitat Holden RT (1986) The Contagiousness of Aircraft Hijacking. Am J Sociol 91:874–904 Holden RT (1986) The Contagiousness of Aircraft Hijacking. Am J Sociol 91:874–904
Zurück zum Zitat Hong N, Ng AKY (2010) The International Legal Instruments in Addressing Piracy and Maritime Terrorism: A Critical Review. Res Transp Econ 27:51–60CrossRef Hong N, Ng AKY (2010) The International Legal Instruments in Addressing Piracy and Maritime Terrorism: A Critical Review. Res Transp Econ 27:51–60CrossRef
Zurück zum Zitat Hosmer DW, Lemeshow S (2000) Applied logistic regression, 2nd edn. John Wiley & Sons, New Jersey, USA Hosmer DW, Lemeshow S (2000) Applied logistic regression, 2nd edn. John Wiley & Sons, New Jersey, USA
Zurück zum Zitat Khondaker AN, Rahman SM, Khan RA (2013) Dynamics of piracy in maritime transportation. J Transp Secur 6:193–207CrossRef Khondaker AN, Rahman SM, Khan RA (2013) Dynamics of piracy in maritime transportation. J Transp Secur 6:193–207CrossRef
Zurück zum Zitat King J (2005) The Security of Merchant Shipping. Mar Policy 29:235–245CrossRef King J (2005) The Security of Merchant Shipping. Mar Policy 29:235–245CrossRef
Zurück zum Zitat Liang KY, Zeger SL (1986) Longitudinal data analysis using generalized linear models. Biometrika 73:13–22CrossRef Liang KY, Zeger SL (1986) Longitudinal data analysis using generalized linear models. Biometrika 73:13–22CrossRef
Zurück zum Zitat Marlow PB (2010) Maritime Security: An Update on Key Issues. Marit Policy Manag 37:667–676CrossRef Marlow PB (2010) Maritime Security: An Update on Key Issues. Marit Policy Manag 37:667–676CrossRef
Zurück zum Zitat Martínez-Zarzoso I, Bensassi S (2013) The Price of Modern Maritime Piracy. Def Peace Econ 24:397–418CrossRef Martínez-Zarzoso I, Bensassi S (2013) The Price of Modern Maritime Piracy. Def Peace Econ 24:397–418CrossRef
Zurück zum Zitat Mejia MQ, Cariou P, Wolff FC (2009) Is Piracy Random? Appl Econ Lett 16:891–895CrossRef Mejia MQ, Cariou P, Wolff FC (2009) Is Piracy Random? Appl Econ Lett 16:891–895CrossRef
Zurück zum Zitat Middleton R. (2008) Piracy in Somalia- Threatening Global Trade, Feeding Local Wars, Briefing Paper, Chatham House, London Middleton R. (2008) Piracy in Somalia- Threatening Global Trade, Feeding Local Wars, Briefing Paper, Chatham House, London
Zurück zum Zitat Ostrom E (2007) Challenges and Growth: The Development of the Interdisciplinary Field of Institutional Analysis. J Inst Econ 3:239–264 Ostrom E (2007) Challenges and Growth: The Development of the Interdisciplinary Field of Institutional Analysis. J Inst Econ 3:239–264
Zurück zum Zitat Pan W (2001) Akaike’s Information Criterion in generalized estimating equations. Biometrika 57:120–125CrossRef Pan W (2001) Akaike’s Information Criterion in generalized estimating equations. Biometrika 57:120–125CrossRef
Zurück zum Zitat Pham JP (2010) ‘The Failed State And Regional Dimensions of Somali Piracy’ in The International Response to Somali Piracy, Brill Books, Leiden, The Netherlands, p 31–64 Pham JP (2010) ‘The Failed State And Regional Dimensions of Somali Piracy’ in The International Response to Somali Piracy, Brill Books, Leiden, The Netherlands, p 31–64
Zurück zum Zitat Pristrom, S, Li KX, Z. Yang, J. Wang (2013) A study of maritime security and piracy. Marit Policy Manag, 40, 675 –693 Pristrom, S, Li KX, Z. Yang, J. Wang (2013) A study of maritime security and piracy. Marit Policy Manag, 40, 675 –693
Zurück zum Zitat Psarros G, Skjong R, Eide MS (2009) The acceptability of maritime security risk. J Transp Secur 2:149–163CrossRef Psarros G, Skjong R, Eide MS (2009) The acceptability of maritime security risk. J Transp Secur 2:149–163CrossRef
Zurück zum Zitat Skaperdas S (2001) The Political Economy of Organized Crime: providing protection when the state does not. Econ Gov 2:173–202CrossRef Skaperdas S (2001) The Political Economy of Organized Crime: providing protection when the state does not. Econ Gov 2:173–202CrossRef
Zurück zum Zitat Sung H-E (2004) Democracy and political corruption: A cross-national comparison. Crime Law Soc Change 4:179–194CrossRef Sung H-E (2004) Democracy and political corruption: A cross-national comparison. Crime Law Soc Change 4:179–194CrossRef
Zurück zum Zitat Tang ML (2001) Exact goodness-of-fit test for binary logistic model. Stat Sin 11:199–211 Tang ML (2001) Exact goodness-of-fit test for binary logistic model. Stat Sin 11:199–211
Zurück zum Zitat Worral J (2000) The Routine Activities of Maritime Piracy. Secur J 13:35–52CrossRef Worral J (2000) The Routine Activities of Maritime Piracy. Secur J 13:35–52CrossRef
Zurück zum Zitat Zeger SL, Liang KY (1986) Longitudinal data analysis for discrete and continuous outcomes. Biometrics 42:121–130CrossRef Zeger SL, Liang KY (1986) Longitudinal data analysis for discrete and continuous outcomes. Biometrics 42:121–130CrossRef
Metadaten
Titel
Socioeconomic development and the risk of maritime piracy
verfasst von
Charles Okeahalam
Kennedy Otwombe
Publikationsdatum
01.12.2016
Verlag
Springer US
Erschienen in
Journal of Transportation Security / Ausgabe 3-4/2016
Print ISSN: 1938-7741
Elektronische ISSN: 1938-775X
DOI
https://doi.org/10.1007/s12198-016-0171-4

Weitere Artikel der Ausgabe 3-4/2016

Journal of Transportation Security 3-4/2016 Zur Ausgabe