713
sufficientinformation,thescorewassomewhatlover
(4.69).OnquestionswhetherDNKthreatassessments
had unclear terminology (1.79) or models (1.64), the
scores were low. Overall, this demonstrates a high
level of satisfaction with DNK threat assessments.
This is also confirmed by the three Company
informants (A‐C) interviewed in
this study. In
particular Informant A stated that DNK ‘… quickly
has become one of the worlds´ best on threat
assessments…’. The somewhat lower score on
whetherDNKprovidessufficientinformation,willbe
discussed further under the issue of sources of
intelligenceinformation.
Afinalissuetobeaddressedin
thisstudyishow
decisions are made by companies, based on threat
assessments. We saw in the data that there are a
variety of roles involved in making security related
decisionsregardingsailinginanarea:Captain,CSO,
CEO, chartering department and operations
department. Notable, when measuring degree of
involvement in
decision‐making the CSO ranked
highest (5.67/7), and the Captain lowest (4.23/7).
However, in terms of the final decision to enter an
area, the captain most frequently had the final say
alongwiththeCEO(both33%).Thisislikelytointer
aliareflectthethreat‐level,orchangestherein,
ofthe
givenareainquestion.AsnotedbyInfB,ifthereare
changesinthelevelofthreatinanarea, anew risk‐
assessment will be conducted and the decision be
liftedtohigherlevelsinthecompany.Italsoreflects
onDNK’sconcernregardingtheroleof
theCSOand
reachingthe rightpeopleinthe member companies,
when communicating threat‐levels. If not the threat‐
assessmentsmaybecomesubjecttoachainofsender‐
reciever relations affecting how the assessemtn is
perceivedandappliedindecision‐making(Kasperson
etal.1988).
Striking the balance between threats,
risks and
economic benefit is a main issue within risk
management (Reason 1997, Rasmussen 1997,
Hollnagel 2009). In this study, we also find this
dilemma. Our questionnaire data demonstrate that
53.85% experience a conflict between security and
economywhileoperatinginthreatareas.Thisreflects
the highly competitive maritime industry where
manycompaniesfeelforcedtooperateatthema rgins
(Rasmussen1997).Thereislittledoubtthatthisaffects
the decisions being made on whether to enter areas
withelevatedthreat‐levels.
Finally, we investigated to what extent maritime
companies use multiple sources of security
informationwhenmakingdecisions.Thiswas
clearly
confirmed by the questionnaire data and by
informants.79.4%inthequestionnaireeither `often´,
`very often´ or `always´ made use of several
intelligence services. In summary, shipping
companies, in general involve a range of company
actors on making security decisions regarding
operating in areas with elevated threat‐levels, with
the
final decision pending on the actual thereat
situation. The economy versus security dilemma is
experienced by a majority of respondents
interviewed.Finallydecisionarecommonlybasedon
multiplesourcesofintelligenceservices.
6 CONCLUSION
This study demonstrate that numerous factors affect
communication between DNK at the member
companies,andhow
thelattermakedecisionsbased
on, among other sources of input, DNK threat
assessments. Perception, communication, economic‐
security dilemmas, the specific characteristics of
vesselsandoperations,andinternaldecision‐making
processes all have an influence. However, DNKs
threat assessments provide important inputs to
companies when they are to make decisions for
individual vessels regarding risks of conducting
operationsinanarea.Ifthecompaniesdonothavean
adequateunderstandingofthenature(piracy,terror)
orlevel(low‐critical)ofthethreat,theywillnotbein
a position to establish adequate security measures
(monitoring, armed guards), or to consider whether
ornottooperateinthearea.Thisisalsoreflectedin
that the companies in this study, overall consider
DNKthreatassessments asimportantandreliableas
asourceofinformationformakingsecuritydecisions.
REFERENCES
Aven, T. & Renn, O. 2010. Risk management and
governance: concepts, guidelines and applications.
Berlin:Springer.
Aven, T., Renn, O. & Rosa, E.A. 2011. On the ontological
statusoftheconceptofrisk.SafetyScience49:1074‐1079.
Aven,T.&Veland,H.2012.Riskcommunicationinthelight
ofdifferent
riskperspectives. ReliabilityEngineering&
SystemSafety,110,34‐40.
Aven, T. & Vinnem, J.E. 2007. Risk management with
applications from the offshore petroleum industry.
London:Springer.
Baniela,S.I&Rios,J.V.2012.PiracyinSomalia:AChallenge
to The International Community. The Journal of
Navigation,65:693–710.
Batalden,B.‐
M.,&Sydnes,A.K. 2014.Maritime safetyand
the ISM Code: a study of investigated casualties and
incidents.JournalofMaritimeAffairs,13:3‐25.
Bueger,C.2015.Learningfrompiracy:futurechallengesof
maritime security governance. Global Affairs, 1(1): 33‐
42.
Cox, Jr., L.A. 2008. Some Limitations of “Risk =
Threat ×
Vulnerability × Consequence” for Risk Analysis of
TerroristAttacks.RiskAnalysis,Vol.28(6):1749‐1761.
Fawcett, J.A. 2010. Challenges to apprehension and
prosecution of East African maritime pirates. Maritime
Policy&Management,37(7):753‐765.
Germond,B.2015. Thegeopoliticaldimension of maritime
security.MarinePolicy54:137‐
142.
Hallahan, K., Holtzhausen, D., Ruler, V.B, Verčič, D. &
Sriramesh, K. 2007. Defining Strategic Communication,
InternationalJournalofStrategicCommunication1(1):3‐
35.
Hasan, S.M. & Hassan, D. 2016. Current Arragements to
Combat Piracy in the Gulf of Guinea Region: An
Evalutation.JournalofMaritimeLawandCommerce
47
(2):171‐217.
Hollnagel,E.2009.TheETTOprinciple.Surrey:Ashgate.
Kasperson, R., Renn, O., Slovic, P., Brown, H., Emel, J.,
Golbe, R., Kasperson, J. & Ratick, S. 1988. The Social
Amplification of Risk: A Conseptual Framework. Risk
Analysis8(2):177‐187.
Kaufmann, G. & Kaufmann, A. 2009. Psykologi
i
Organisasjon og Ledelse. Bergen: Fagbokforlaget
Vigmostad&BjørkeAS.