Analysis of the methodology used for the determination of security levels in the port of Manta, Equator

This research aims to develop a method-ology to evaluate the security of Manta Port progres-sively achieving secondary objectives that culminate in the creation of a risk matrix. A simple quantitative and qualitative methodology is used; it determines the com-bination of risk with the damage that co...

Full description

Autores:
Macías Párraga, Mariela Jahaira
Gonzáles Cancelas, Maria
Soler Flores, Francisco
Tipo de recurso:
Article of journal
Fecha de publicación:
2015
Institución:
Corporación Universidad de la Costa
Repositorio:
REDICUC - Repositorio CUC
Idioma:
eng
OAI Identifier:
oai:repositorio.cuc.edu.co:11323/2557
Acceso en línea:
https://hdl.handle.net/11323/2557
https://doi.org/10.17981/ingecuc.11.2.2015.01
https://repositorio.cuc.edu.co/
Palabra clave:
Ports
Security
Risks
Protection Measure
Vulnerability
ISPS
SOLAS
Rights
openAccess
License
http://purl.org/coar/access_right/c_abf2
id RCUC2_8b00215745ba0db15244b71d520b1e52
oai_identifier_str oai:repositorio.cuc.edu.co:11323/2557
network_acronym_str RCUC2
network_name_str REDICUC - Repositorio CUC
repository_id_str
dc.title.spa.fl_str_mv Analysis of the methodology used for the determination of security levels in the port of Manta, Equator
title Analysis of the methodology used for the determination of security levels in the port of Manta, Equator
spellingShingle Analysis of the methodology used for the determination of security levels in the port of Manta, Equator
Ports
Security
Risks
Protection Measure
Vulnerability
ISPS
SOLAS
title_short Analysis of the methodology used for the determination of security levels in the port of Manta, Equator
title_full Analysis of the methodology used for the determination of security levels in the port of Manta, Equator
title_fullStr Analysis of the methodology used for the determination of security levels in the port of Manta, Equator
title_full_unstemmed Analysis of the methodology used for the determination of security levels in the port of Manta, Equator
title_sort Analysis of the methodology used for the determination of security levels in the port of Manta, Equator
dc.creator.fl_str_mv Macías Párraga, Mariela Jahaira
Gonzáles Cancelas, Maria
Soler Flores, Francisco
dc.contributor.author.spa.fl_str_mv Macías Párraga, Mariela Jahaira
Gonzáles Cancelas, Maria
Soler Flores, Francisco
dc.subject.spa.fl_str_mv Ports
Security
Risks
Protection Measure
Vulnerability
ISPS
SOLAS
topic Ports
Security
Risks
Protection Measure
Vulnerability
ISPS
SOLAS
description This research aims to develop a method-ology to evaluate the security of Manta Port progres-sively achieving secondary objectives that culminate in the creation of a risk matrix. A simple quantitative and qualitative methodology is used; it determines the com-bination of risk with the damage that could be caused, along with the estimated probability of an incident, thus, leading to a risk assessment. As a final result, a risk matrix for the Port of Manta was developed, which is the final chapter in the development of the suggested methodology; besides, it presents a clear and true pic-ture of risk assessment so as to determine security lev-els and develop a method feasible to be implemented in any port of the world
publishDate 2015
dc.date.issued.none.fl_str_mv 2015-09-28
dc.date.accessioned.none.fl_str_mv 2019-02-15T21:23:04Z
dc.date.available.none.fl_str_mv 2019-02-15T21:23:04Z
dc.type.spa.fl_str_mv Artículo de revista
dc.type.coar.fl_str_mv http://purl.org/coar/resource_type/c_2df8fbb1
dc.type.coar.spa.fl_str_mv http://purl.org/coar/resource_type/c_6501
dc.type.content.spa.fl_str_mv Text
dc.type.driver.spa.fl_str_mv info:eu-repo/semantics/article
dc.type.redcol.spa.fl_str_mv http://purl.org/redcol/resource_type/ART
dc.type.version.spa.fl_str_mv info:eu-repo/semantics/acceptedVersion
format http://purl.org/coar/resource_type/c_6501
status_str acceptedVersion
dc.identifier.citation.spa.fl_str_mv Macías Párraga, M., Gonzáles Cancelas, M., & Soler Flores, F. (2015). Análisis de la metodología a emplear en la determinación del nivel de seguridad del puerto de Manta-Ecuador. INGE CUC, 11(2), 9-17. https://doi.org/10.17981/ingecuc.11.2.2015.01
dc.identifier.issn.spa.fl_str_mv 0122-6517, 2382-4700 electrónico
dc.identifier.uri.spa.fl_str_mv https://hdl.handle.net/11323/2557
dc.identifier.url.spa.fl_str_mv https://doi.org/10.17981/ingecuc.11.2.2015.01
dc.identifier.doi.spa.fl_str_mv 10.17981/ingecuc.11.2.2015.01
dc.identifier.eissn.spa.fl_str_mv 2382-4700
dc.identifier.instname.spa.fl_str_mv Corporación Universidad de la Costa
dc.identifier.pissn.spa.fl_str_mv 0122-6517
dc.identifier.reponame.spa.fl_str_mv REDICUC - Repositorio CUC
dc.identifier.repourl.spa.fl_str_mv https://repositorio.cuc.edu.co/
identifier_str_mv Macías Párraga, M., Gonzáles Cancelas, M., & Soler Flores, F. (2015). Análisis de la metodología a emplear en la determinación del nivel de seguridad del puerto de Manta-Ecuador. INGE CUC, 11(2), 9-17. https://doi.org/10.17981/ingecuc.11.2.2015.01
0122-6517, 2382-4700 electrónico
10.17981/ingecuc.11.2.2015.01
2382-4700
Corporación Universidad de la Costa
0122-6517
REDICUC - Repositorio CUC
url https://hdl.handle.net/11323/2557
https://doi.org/10.17981/ingecuc.11.2.2015.01
https://repositorio.cuc.edu.co/
dc.language.iso.none.fl_str_mv eng
language eng
dc.relation.ispartofseries.spa.fl_str_mv INGE CUC; Vol. 11, Núm. 2 (2015)
dc.relation.ispartofjournal.spa.fl_str_mv INGE CUC
INGE CUC
dc.relation.references.spa.fl_str_mv [1] J. S. Helmick, “Port and maritime security: A research perspective,” J. Transp. Secur., vol. 1, no. 1, pp. 15–28, Dec. 2007. DOI: 10.1007/s12198-007-0007-3
[2] M. Sgut, Efectos económicos de las nuevas medidas de protección marítima y portuaria. Canada: Comisión Económica para América Latina y el Caribe, 2006.
[3] C. B. Acevedo, “El Código Internacional Para La Protección De Los Buques E Instalaciones Portuarias (Código Pbip). Orígenes Del Código Pbip,” Rev. Derecho La Pontif. Univ. Católica Valparaíso, Vol. 25, Pp. 33 – 48, 2004.
[4] Ministerio de Asuntos Exteriores y de Cooperación, “CÓDIGO INTERNACIONAL para la protección de los buques y de las instalaciones portuarias (Código PBIP),” 2002. [Online]. Available: https://www.boe.es/buscar/doc.php?id=BOE-A-2004-15290.
[5] F. E. Hernández Custode, “Elaboración del sistema de gestión de prevención de riesgos laborales del Puerto de Manta,” M.S thesis, Dept. Ind. Eng., Univ. Laica Eloy Alfaro De Manabi, Manta, Ecuador 2010.
[6] Comunidad Andina, “Seguridad portuaria: La Guía de Planificación Nacional,” 2000.
[7] E. A. López, “Estrategias De Investigación,” In Politica Fiscal Y Estrategia Como Factor De Desarrollo De La Mediana Empresa Comercial Sinaloense. Un Estudio De Caso, Culiacán, 2015.
[8] C. Macilwain, “Bush goes to war as budget boosts R&D.,” Nature, vol. 415, no. 6872, p. 564, Feb. 2002. DOI: 10.1038/415564a
[9] J. Dawson and P. Guinnessy, “Terrorism drives bush R&D money to defense and NIH; Other science funding flat in fiscal 2003,” Phys. Today, vol. 55, no. 4, pp. 30–36, Apr. 2002. DOI: 10.1063/1.1480779
[10] “The Budget and Economic Outlook: Fiscal Years 2003-2012 | Congressional Budget Office.” [Online]. Available: https://www.cbo.gov/publication/13504. [Accessed: 16-Sep-2015].
[11] “Testimony on The Budget and Economic Outlook: Fiscal Years 2006 to 2015 | Congressional Budget Office.” [Online]. Available: https://www.cbo.gov/publication/16226. [Accessed: 16-Sep-2015].
[12] R. B. Manaut and C. R. Ulloa, “Seguridad y fronteras en Norteamérica. Del TLCAN a la ASPAN,” Front. Norte, vol. 18, no. 35, pp. 7–28, 2006.
[13] C. Lum, L. W. Kennedy, and A. Sherley, “Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research,” J. Exp. Criminol., vol. 2, no. 4, pp. 489–516, Dec. 2006. DOI: 10.1007/s11292-006-9020-y
[14] C. Lum, L. W. Kennedy, and A. Sherley, “Is counter-terrorism policy evidence-based? What works, what harms, and what is unknown.,” Psicothema, vol. 20, no. 1, pp. 35–42, Feb. 2008.
[15] J. Hainmuller and J. M. Lemnitzer, “Why do Europeans fly safer? The politics of airport security in Europe and the US,” Terror. Polit. Violence, vol. 15, no. 4, pp. 1–36, 2003. DOI: 10.1080=09546550390449863
[16] K. B. Lee and M. E. Reichardt, “Open standards for homeland security sensor networks,” IEEE Instrum. Meas. Mag., vol. 8, no. 5, pp. 14–21, Dec. 2005. DOI: 10.1109/MIM.2005.1578613
[17] R. W. Poole Jr And G. Passantino, A Risk-Based Airport Security Policy. 2003, Pp. 1–33.
[18] S. E. Flynn, “Port Security Is Still a House of Cards,” East. Econ. Rev., vol. 169, no. 1, pp. 5–11, 2006.
[19] T. G. Lewis, Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. NJ: John Wiley & Sons, Inc., 2006. DOI: 10.1007/s12198-007-0007-3
[20] J. P. Burgess, “Social values and material threat: the European Programme for Critical Infrastructure Protection,” Int. J. Crit. Infrastructures, vol. 3, no. 3, pp. 471 – 487, 2007. DOI: 10.1504/IJCIS.2007.014121
[21] P. Chalk, “The Maritime Dimension of International Security,” RAND Corporation, 2008.
[22] H. Hesse, “Maritime Security in a Multilateral Context: IMO Activities to Enhance Maritime Security,” Int. J. Mar. Coast. Law, vol. 18, no. 3, pp. 327–340, Sep. 2003. DOI: 10.1163/092735203770223567
[23] R. G. Bernal, M. Manosalva, S. Rezende, M. Sgut, and R. Sanchez, “Protección marítima y portuaria en América del Sur. Implementación de las medidas y estimación de gastos.” pp. 7–61, 2004.
[24] A. Mazaheri and D. Ekwall, “Impacts of the ISPS code on port activities: a case study on Swedish ports,” World Rev. Intermodal Transp. Res., vol. 2, no. 4, pp. 326–342, 2009. DOI: 10.1504/WRITR.2009.026211
[25] K. Bichou and R. Talas, “Overview of contemporary supply chain security initiatives,” in Maritime Transport Security, pp. 24–39. DOI: 10.4337/9781781954973
[26] S.Y. Yi, '"An approach to improve international maritime security through the coordination between the IMO instruments and the Proliferation Security Initiative (PSI) regime," M.S thesis, Dept Marit and Env.Admon. World Maritime Univ. Malmö, Suecia, 2013.
[27] P. A. Elizalde Monteagudo, “La Incidencia de las Normas de Protección Marítima en el Transporte Marítimo,” M.S thesis, Dept, Dret Privat. Univ. Autònoma de Barcelona, Barcelona, España, 2012.
[28] W. Keefer, “Container Port Security: A Layered Defense Strategy to Protect the Homeland and the International Supply Chain,” Campbell Law Review, vol. 30, no. 1. 2007.
[29] P. Knight, '"Supply chain security guidelines," IBM, White paper, 2003. [On line] Available: http://www-03.ibm.com/procurement/proweb.nsf/objectdocswebview/filesupply+chain+security+guidelines/$file/supply+chain+security+guidelines+12sep03.pdf
[30] F. Piniella, J. Walliser, and A. Martínez, “Global Maritime Security: the role of Spain as a Port State,” Journal of Maritime Research, vol. 5, no. 3. pp. 15–32, 24-Jan-2014.
[31] K. Christopher, Port Security Management. New York: CRC Press Book, 2009.
[32] Center for Food Safety and Applied Nutrition, Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (PL107-188). United States: Center for Food Safety and Applied Nutrition, 2002.
[33] L. Urciuoli and D. Ekwall, “Possible impacts of supply chain security on efficiency - A survey study about the possible impacts of AEO security certifications on supply chain efficiency,” Jun. 2012.
[34] Y.-C. Yang, “Risk management of Taiwan’s maritime supply chain security,” Saf. Sci., vol. 49, no. 3, pp. 382–393, Mar. 2011. DOI: 10.1016/j.ssci.2010.09.019
[35] C. A. Vallejo Ramirez, “Drug transport in containers: Risk of international supply chain logistics,”M.S. thesis, Dept. Rel. Internal. Estr. and Segur. Univ.Militar Nueva Granada, Medellin, Colombia, 2015.
[36] E. Sadovaya and V.V. Thai, '"Maritime Security Requirements for Shipping Companies and Ports: Implementation, Importance and Effectiveness,"2007. [Online] available:http://www.icms.polyu.edu.hk/ifspa2012/Papers/M05.pdf
[37] M.M. Párraga, N. González-Cancelas and F. Soler-Flores, '"Port security applied to Transfer Port of Manta," Advanced Research in Scientific Areas pp.508-512, Dec. 2013.
[38] Cámara Marítima y Portuaria de Chile, '"Normas Internacionales de Seguridad Antiterrorista: Su efecto en los Puertos Chilenos," .2014 [Online] available: http://www.cursos.ucv.cl/tra34500/pg000.html
[39] M. Autoridad Portuaria, '"Puerto de Manta,", 21 de Junio 2013, pp. 10.
[40] F. Soler-Flores, “Proposal for the integration of the Port of Manta in Latin American multimodal logistics,” Proc. GV - Glob. Virtual Conf., no. 1, Apr. 2013.
[41] “Using portfolio optimisation to calculate the efficient relationship between maritime port security residual risk and security investment,” Int. J. Shipp. Transp. Logist. IJSTL, vol. 6, no. 3, pp. 314–338, 2014. DOI: 10.1504/IJSTL.2014.060788
[42] R. Núñez-Sánchez, S. Jara-Díaz, and P. Coto-Millán, “Public regulation and passengers importance in port infrastructure costs,” Transp. Res. Part A Policy Pract., vol. 45, no. 7, pp. 653–666, Aug. 2011. DOI: 10.1016/j.tra.2011.04.012
[43] R. Núñez-Sánchez, S. Jara-Díaz, and P. Coto-Millán, “Public regulation and passengers importance in port infrastructure costs,” Transp. Res. Part A Policy Pract., vol. 45, no. 7, pp. 653–666, Aug. 2011. DOI: 10.1016/j.tra.2011.04.012
[44] S.F. Aguas Almeida and L.E. Cevallos Karolys, '"Modelo de desarrollo y aplicación del cuadro de mando integral en operadoras portuarias, caso Puerto de Manta," M.S thesis, Dept. Fin Eng., Univ. Central Del Ecuador, Quito, Ecuador, 2012.
[45] K. Bichou, J. S. Szyliowicz, and L. Zamparini, Maritime Transport Security: Issues, Challenges and National Policies, 1st ed., vol. 1. Massachuesetts, 2013.
[46] O. Doerr, Politicas Portuarias. Santiago de Chile: Naciones Unidas, 2011.
[47] M. McNicholas, '"Guía Estratégica para la Seguridad Portuaria de Clase Mundial,". 2011 [Online] available: http://www.phoenixgrouppanama.com/downloads/pdf/Port%20Security%20Primer_spn_.June%2002.pdf
[48] K. Bichou, M. Bell, and A. Evans, Risk Management in Port Operations, Logistics and Supply Chain Security, 2nd ed. New York: McGrawHill, 2014.
[49] C. Ducruet, “The polarization of global container flows by interoceanic canals: geographic coverage and network vulnerability,” Marit. Policy Manag., pp. 1–19, Mar. 2015. DOI: 10.1080/03088839.2015.1022612
[50] C.A. Bernal Torres, '"Seguridad portuaria: una necesidad o una ventaja competitiva para colombia,".2014
[51] Ministerio de Transporte y Obras Públicas, Ecuador, '"Plan Estratégico de Movilidad: Puerto de Transferencia de Manta,". [Online] available: http://www.puertodemanta.gob.ec/wp-content/uploads/2013/11/10-Plan-Desarrollo-Puerto-de-Manta.pdf
[52] Organización Marítima Internacional, '"Protección en los puertos. Repertorio de recomendaciones prácticas,",2004. [Online] available: http://www.ilo.org/wcmsp5/groups/public/---ed_dialogue/---sector/documents/normativeinstrument/wcms_162330.pdf
dc.relation.citationissue.spa.fl_str_mv 2
dc.relation.citationvolume.spa.fl_str_mv 11
dc.relation.ispartofjournalabbrev.spa.fl_str_mv INGE CUC
dc.rights.accessrights.spa.fl_str_mv info:eu-repo/semantics/openAccess
dc.rights.coar.spa.fl_str_mv http://purl.org/coar/access_right/c_abf2
eu_rights_str_mv openAccess
rights_invalid_str_mv http://purl.org/coar/access_right/c_abf2
dc.format.mimetype.spa.fl_str_mv application/pdf
dc.publisher.spa.fl_str_mv Corporación Universidad de la Costa
dc.source.spa.fl_str_mv INGE CUC
institution Corporación Universidad de la Costa
dc.source.url.spa.fl_str_mv https://revistascientificas.cuc.edu.co/ingecuc/article/view/511
bitstream.url.fl_str_mv https://repositorio.cuc.edu.co/bitstreams/01dce5d7-1cde-4a19-bac1-380b8ee6b1b3/download
https://repositorio.cuc.edu.co/bitstreams/df596bda-fd23-4042-a65b-b32b4cf328c0/download
https://repositorio.cuc.edu.co/bitstreams/1585701c-52a5-4e97-b24b-1eb13ec80cb1/download
https://repositorio.cuc.edu.co/bitstreams/b3edb522-f69e-4551-9e2a-245a11f36f1f/download
bitstream.checksum.fl_str_mv 9a1d574ee64dc66f5da36ebb5f150cbf
8a4605be74aa9ea9d79846c1fba20a33
cf64029c57491764b813600830e6224f
8ced167d4f1d7588dcc22eb3ca390a18
bitstream.checksumAlgorithm.fl_str_mv MD5
MD5
MD5
MD5
repository.name.fl_str_mv Repositorio de la Universidad de la Costa CUC
repository.mail.fl_str_mv repdigital@cuc.edu.co
_version_ 1828166843668365312
spelling Macías Párraga, Mariela JahairaGonzáles Cancelas, MariaSoler Flores, Francisco2019-02-15T21:23:04Z2019-02-15T21:23:04Z2015-09-28Macías Párraga, M., Gonzáles Cancelas, M., & Soler Flores, F. (2015). Análisis de la metodología a emplear en la determinación del nivel de seguridad del puerto de Manta-Ecuador. INGE CUC, 11(2), 9-17. https://doi.org/10.17981/ingecuc.11.2.2015.010122-6517, 2382-4700 electrónicohttps://hdl.handle.net/11323/2557https://doi.org/10.17981/ingecuc.11.2.2015.0110.17981/ingecuc.11.2.2015.012382-4700Corporación Universidad de la Costa0122-6517REDICUC - Repositorio CUChttps://repositorio.cuc.edu.co/This research aims to develop a method-ology to evaluate the security of Manta Port progres-sively achieving secondary objectives that culminate in the creation of a risk matrix. A simple quantitative and qualitative methodology is used; it determines the com-bination of risk with the damage that could be caused, along with the estimated probability of an incident, thus, leading to a risk assessment. As a final result, a risk matrix for the Port of Manta was developed, which is the final chapter in the development of the suggested methodology; besides, it presents a clear and true pic-ture of risk assessment so as to determine security lev-els and develop a method feasible to be implemented in any port of the worldEste trabajo de investigación tiene como objetivo desarrollar una metodología de evaluación de la seguridad portuaria de Manta, alcanzando progresivamente objetivos secundarios que culminan con la creación de una matriz de riesgos. Se emplea una metodología sencilla, tanto cuantitativa como cualitativa, que determina la combinación del riesgo con el daño que se podría causar, junto con la probabilidad estimada de que ocurra un incidente, dando así lugar a una valoración del riesgo. Como resultado final se elaboró una matriz de riesgos del Puerto de Manta, siendo el acápite final del desarrollo de la metodología propuesta, además de que presenta un panorama claro y real de la evaluación de riesgos que permite determinar los niveles de seguridad; asimismo, desarrolla una metodología que puede ser implementada en cualquier puerto del mundo.Macías Párraga, Mariela JahairaGonzáles Cancelas, MariaSoler Flores, Franciscoapplication/pdfengCorporación Universidad de la CostaINGE CUC; Vol. 11, Núm. 2 (2015)INGE CUCINGE CUC[1] J. S. Helmick, “Port and maritime security: A research perspective,” J. Transp. Secur., vol. 1, no. 1, pp. 15–28, Dec. 2007. DOI: 10.1007/s12198-007-0007-3[2] M. Sgut, Efectos económicos de las nuevas medidas de protección marítima y portuaria. Canada: Comisión Económica para América Latina y el Caribe, 2006.[3] C. B. Acevedo, “El Código Internacional Para La Protección De Los Buques E Instalaciones Portuarias (Código Pbip). Orígenes Del Código Pbip,” Rev. Derecho La Pontif. Univ. Católica Valparaíso, Vol. 25, Pp. 33 – 48, 2004.[4] Ministerio de Asuntos Exteriores y de Cooperación, “CÓDIGO INTERNACIONAL para la protección de los buques y de las instalaciones portuarias (Código PBIP),” 2002. [Online]. Available: https://www.boe.es/buscar/doc.php?id=BOE-A-2004-15290.[5] F. E. Hernández Custode, “Elaboración del sistema de gestión de prevención de riesgos laborales del Puerto de Manta,” M.S thesis, Dept. Ind. Eng., Univ. Laica Eloy Alfaro De Manabi, Manta, Ecuador 2010.[6] Comunidad Andina, “Seguridad portuaria: La Guía de Planificación Nacional,” 2000.[7] E. A. López, “Estrategias De Investigación,” In Politica Fiscal Y Estrategia Como Factor De Desarrollo De La Mediana Empresa Comercial Sinaloense. Un Estudio De Caso, Culiacán, 2015.[8] C. Macilwain, “Bush goes to war as budget boosts R&D.,” Nature, vol. 415, no. 6872, p. 564, Feb. 2002. DOI: 10.1038/415564a[9] J. Dawson and P. Guinnessy, “Terrorism drives bush R&D money to defense and NIH; Other science funding flat in fiscal 2003,” Phys. Today, vol. 55, no. 4, pp. 30–36, Apr. 2002. DOI: 10.1063/1.1480779[10] “The Budget and Economic Outlook: Fiscal Years 2003-2012 | Congressional Budget Office.” [Online]. Available: https://www.cbo.gov/publication/13504. [Accessed: 16-Sep-2015].[11] “Testimony on The Budget and Economic Outlook: Fiscal Years 2006 to 2015 | Congressional Budget Office.” [Online]. Available: https://www.cbo.gov/publication/16226. [Accessed: 16-Sep-2015].[12] R. B. Manaut and C. R. Ulloa, “Seguridad y fronteras en Norteamérica. Del TLCAN a la ASPAN,” Front. Norte, vol. 18, no. 35, pp. 7–28, 2006.[13] C. Lum, L. W. Kennedy, and A. Sherley, “Are counter-terrorism strategies effective? The results of the Campbell systematic review on counter-terrorism evaluation research,” J. Exp. Criminol., vol. 2, no. 4, pp. 489–516, Dec. 2006. DOI: 10.1007/s11292-006-9020-y[14] C. Lum, L. W. Kennedy, and A. Sherley, “Is counter-terrorism policy evidence-based? What works, what harms, and what is unknown.,” Psicothema, vol. 20, no. 1, pp. 35–42, Feb. 2008.[15] J. Hainmuller and J. M. Lemnitzer, “Why do Europeans fly safer? The politics of airport security in Europe and the US,” Terror. Polit. Violence, vol. 15, no. 4, pp. 1–36, 2003. DOI: 10.1080=09546550390449863[16] K. B. Lee and M. E. Reichardt, “Open standards for homeland security sensor networks,” IEEE Instrum. Meas. Mag., vol. 8, no. 5, pp. 14–21, Dec. 2005. DOI: 10.1109/MIM.2005.1578613[17] R. W. Poole Jr And G. Passantino, A Risk-Based Airport Security Policy. 2003, Pp. 1–33.[18] S. E. Flynn, “Port Security Is Still a House of Cards,” East. Econ. Rev., vol. 169, no. 1, pp. 5–11, 2006.[19] T. G. Lewis, Critical Infrastructure Protection in Homeland Security: Defending a Networked Nation. NJ: John Wiley & Sons, Inc., 2006. DOI: 10.1007/s12198-007-0007-3[20] J. P. Burgess, “Social values and material threat: the European Programme for Critical Infrastructure Protection,” Int. J. Crit. Infrastructures, vol. 3, no. 3, pp. 471 – 487, 2007. DOI: 10.1504/IJCIS.2007.014121[21] P. Chalk, “The Maritime Dimension of International Security,” RAND Corporation, 2008.[22] H. Hesse, “Maritime Security in a Multilateral Context: IMO Activities to Enhance Maritime Security,” Int. J. Mar. Coast. Law, vol. 18, no. 3, pp. 327–340, Sep. 2003. DOI: 10.1163/092735203770223567[23] R. G. Bernal, M. Manosalva, S. Rezende, M. Sgut, and R. Sanchez, “Protección marítima y portuaria en América del Sur. Implementación de las medidas y estimación de gastos.” pp. 7–61, 2004.[24] A. Mazaheri and D. Ekwall, “Impacts of the ISPS code on port activities: a case study on Swedish ports,” World Rev. Intermodal Transp. Res., vol. 2, no. 4, pp. 326–342, 2009. DOI: 10.1504/WRITR.2009.026211[25] K. Bichou and R. Talas, “Overview of contemporary supply chain security initiatives,” in Maritime Transport Security, pp. 24–39. DOI: 10.4337/9781781954973[26] S.Y. Yi, '"An approach to improve international maritime security through the coordination between the IMO instruments and the Proliferation Security Initiative (PSI) regime," M.S thesis, Dept Marit and Env.Admon. World Maritime Univ. Malmö, Suecia, 2013.[27] P. A. Elizalde Monteagudo, “La Incidencia de las Normas de Protección Marítima en el Transporte Marítimo,” M.S thesis, Dept, Dret Privat. Univ. Autònoma de Barcelona, Barcelona, España, 2012.[28] W. Keefer, “Container Port Security: A Layered Defense Strategy to Protect the Homeland and the International Supply Chain,” Campbell Law Review, vol. 30, no. 1. 2007.[29] P. Knight, '"Supply chain security guidelines," IBM, White paper, 2003. [On line] Available: http://www-03.ibm.com/procurement/proweb.nsf/objectdocswebview/filesupply+chain+security+guidelines/$file/supply+chain+security+guidelines+12sep03.pdf[30] F. Piniella, J. Walliser, and A. Martínez, “Global Maritime Security: the role of Spain as a Port State,” Journal of Maritime Research, vol. 5, no. 3. pp. 15–32, 24-Jan-2014.[31] K. Christopher, Port Security Management. New York: CRC Press Book, 2009.[32] Center for Food Safety and Applied Nutrition, Public Health Security and Bioterrorism Preparedness and Response Act of 2002 (PL107-188). United States: Center for Food Safety and Applied Nutrition, 2002.[33] L. Urciuoli and D. Ekwall, “Possible impacts of supply chain security on efficiency - A survey study about the possible impacts of AEO security certifications on supply chain efficiency,” Jun. 2012.[34] Y.-C. Yang, “Risk management of Taiwan’s maritime supply chain security,” Saf. Sci., vol. 49, no. 3, pp. 382–393, Mar. 2011. DOI: 10.1016/j.ssci.2010.09.019[35] C. A. Vallejo Ramirez, “Drug transport in containers: Risk of international supply chain logistics,”M.S. thesis, Dept. Rel. Internal. Estr. and Segur. Univ.Militar Nueva Granada, Medellin, Colombia, 2015.[36] E. Sadovaya and V.V. Thai, '"Maritime Security Requirements for Shipping Companies and Ports: Implementation, Importance and Effectiveness,"2007. [Online] available:http://www.icms.polyu.edu.hk/ifspa2012/Papers/M05.pdf[37] M.M. Párraga, N. González-Cancelas and F. Soler-Flores, '"Port security applied to Transfer Port of Manta," Advanced Research in Scientific Areas pp.508-512, Dec. 2013.[38] Cámara Marítima y Portuaria de Chile, '"Normas Internacionales de Seguridad Antiterrorista: Su efecto en los Puertos Chilenos," .2014 [Online] available: http://www.cursos.ucv.cl/tra34500/pg000.html[39] M. Autoridad Portuaria, '"Puerto de Manta,", 21 de Junio 2013, pp. 10.[40] F. Soler-Flores, “Proposal for the integration of the Port of Manta in Latin American multimodal logistics,” Proc. GV - Glob. Virtual Conf., no. 1, Apr. 2013.[41] “Using portfolio optimisation to calculate the efficient relationship between maritime port security residual risk and security investment,” Int. J. Shipp. Transp. Logist. IJSTL, vol. 6, no. 3, pp. 314–338, 2014. DOI: 10.1504/IJSTL.2014.060788[42] R. Núñez-Sánchez, S. Jara-Díaz, and P. Coto-Millán, “Public regulation and passengers importance in port infrastructure costs,” Transp. Res. Part A Policy Pract., vol. 45, no. 7, pp. 653–666, Aug. 2011. DOI: 10.1016/j.tra.2011.04.012[43] R. Núñez-Sánchez, S. Jara-Díaz, and P. Coto-Millán, “Public regulation and passengers importance in port infrastructure costs,” Transp. Res. Part A Policy Pract., vol. 45, no. 7, pp. 653–666, Aug. 2011. DOI: 10.1016/j.tra.2011.04.012[44] S.F. Aguas Almeida and L.E. Cevallos Karolys, '"Modelo de desarrollo y aplicación del cuadro de mando integral en operadoras portuarias, caso Puerto de Manta," M.S thesis, Dept. Fin Eng., Univ. Central Del Ecuador, Quito, Ecuador, 2012.[45] K. Bichou, J. S. Szyliowicz, and L. Zamparini, Maritime Transport Security: Issues, Challenges and National Policies, 1st ed., vol. 1. Massachuesetts, 2013.[46] O. Doerr, Politicas Portuarias. Santiago de Chile: Naciones Unidas, 2011.[47] M. McNicholas, '"Guía Estratégica para la Seguridad Portuaria de Clase Mundial,". 2011 [Online] available: http://www.phoenixgrouppanama.com/downloads/pdf/Port%20Security%20Primer_spn_.June%2002.pdf[48] K. Bichou, M. Bell, and A. Evans, Risk Management in Port Operations, Logistics and Supply Chain Security, 2nd ed. New York: McGrawHill, 2014.[49] C. Ducruet, “The polarization of global container flows by interoceanic canals: geographic coverage and network vulnerability,” Marit. Policy Manag., pp. 1–19, Mar. 2015. DOI: 10.1080/03088839.2015.1022612[50] C.A. Bernal Torres, '"Seguridad portuaria: una necesidad o una ventaja competitiva para colombia,".2014[51] Ministerio de Transporte y Obras Públicas, Ecuador, '"Plan Estratégico de Movilidad: Puerto de Transferencia de Manta,". [Online] available: http://www.puertodemanta.gob.ec/wp-content/uploads/2013/11/10-Plan-Desarrollo-Puerto-de-Manta.pdf[52] Organización Marítima Internacional, '"Protección en los puertos. Repertorio de recomendaciones prácticas,",2004. [Online] available: http://www.ilo.org/wcmsp5/groups/public/---ed_dialogue/---sector/documents/normativeinstrument/wcms_162330.pdf211INGE CUCINGE CUChttps://revistascientificas.cuc.edu.co/ingecuc/article/view/511PortsSecurityRisksProtection MeasureVulnerabilityISPSSOLASAnalysis of the methodology used for the determination of security levels in the port of Manta, EquatorArtículo de revistahttp://purl.org/coar/resource_type/c_6501http://purl.org/coar/resource_type/c_2df8fbb1Textinfo:eu-repo/semantics/articlehttp://purl.org/redcol/resource_type/ARTinfo:eu-repo/semantics/acceptedVersioninfo:eu-repo/semantics/openAccesshttp://purl.org/coar/access_right/c_abf2PublicationORIGINALAnalysis of the Methodology Used for the Determination of Security Levels in the Port of Manta, Equator.pdfAnalysis of the Methodology Used for the Determination of Security Levels in the Port of Manta, Equator.pdfapplication/pdf1061496https://repositorio.cuc.edu.co/bitstreams/01dce5d7-1cde-4a19-bac1-380b8ee6b1b3/download9a1d574ee64dc66f5da36ebb5f150cbfMD51LICENSElicense.txtlicense.txttext/plain; charset=utf-81748https://repositorio.cuc.edu.co/bitstreams/df596bda-fd23-4042-a65b-b32b4cf328c0/download8a4605be74aa9ea9d79846c1fba20a33MD52THUMBNAILAnalysis of the Methodology Used for the Determination of Security Levels in the Port of Manta, Equator.pdf.jpgAnalysis of the Methodology Used for the Determination of Security Levels in the Port of Manta, Equator.pdf.jpgimage/jpeg54616https://repositorio.cuc.edu.co/bitstreams/1585701c-52a5-4e97-b24b-1eb13ec80cb1/downloadcf64029c57491764b813600830e6224fMD54TEXTAnalysis of the Methodology Used for the Determination of Security Levels in the Port of Manta, Equator.pdf.txtAnalysis of the Methodology Used for the Determination of Security Levels in the Port of Manta, Equator.pdf.txttext/plain40654https://repositorio.cuc.edu.co/bitstreams/b3edb522-f69e-4551-9e2a-245a11f36f1f/download8ced167d4f1d7588dcc22eb3ca390a18MD5511323/2557oai:repositorio.cuc.edu.co:11323/25572024-09-17 14:17:05.085open.accesshttps://repositorio.cuc.edu.coRepositorio de la Universidad de la Costa CUCrepdigital@cuc.edu.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