Handbook of Governance and Security
Show Less

Handbook of Governance and Security

Edited by James Sperling

The Handbook of Governance and Security examines the conceptual evolution of security governance and the different manifestations of regional security governance. In particular, James Sperling brings together unique contributions from leading scholars to explore the role of institutions that have emerged as critical suppliers of security governance and the ever-widening set of security issues that can be viewed profitably through a governance lens.
Buy Book in Print
Show Summary Details
You do not have access to this content

Chapter 21: Maritime space

Natalie Klein


Maritime security governance has come into increasing prominence following the attacks on the United States on 11 September 2001. Prior to those attacks, maritime security was primarily focused on traditional security concerns relating to the protection of borders and the concomitant exertion of authority over resources within those borders. Other ‘second order’ maritime security concerns, such as transnational crime and piracy, had also been matters addressed in questions of oceans governance. With the 11 September attacks, there was greater realization of the devastation that could potentially be caused by deliberate disruptions to international shipping and how the oceans could be used to facilitate and serve those actors posing threats to maritime stability. The meaning of maritime security varies depending on the user. For those in national defense forces, charged with maintaining the security of their state and its interests, maritime security is very much directed to threats to the border and to a state’s territory and resources. For those working in the international shipping industry, maritime security will be focused on the safety of vessels and those on board vessels as they ply ocean routes collecting and delivering goods throughout the world. Policing and other agencies concerned with protecting civil society will focus maritime security on addressing threats that potentially harm that society, such as drug trafficking, piracy and people-smuggling.

You are not authenticated to view the full text of this chapter or article.

Elgaronline requires a subscription or purchase to access the full text of books or journals. Please login through your library system or with your personal username and password on the homepage.

Non-subscribers can freely search the site, view abstracts/ extracts and download selected front matter and introductory chapters for personal use.

Your library may not have purchased all subject areas. If you are authenticated and think you should have access to this title, please contact your librarian.

Further information

or login to access all content.