311
Views
1
CrossRef citations to date
0
Altmetric
Articles

Development of a conceptual framework of private maritime security company of Malaysia

, , , &

References

  • Ahmad Fuad, A. F., S. A. Y. M. Syed Ahmad, and N. A. Osnin. 2017. “The Proposed New Framework for the Private Maritime Security Company of Malaysia.” 18th Annual General Assembly of the International Association of Maritime Universities – Global Perspectives in MET: Towards Sustainable, Green and Integrated Maritime Transport, IAMU 2017, 2, 137–146.
  • Anis, M. N. 2006. “Straits No More a War Risk Zone.” The Star.
  • Belton, I. 2019. “Improving the Practical Application of the Delphi Method in Group-Based Judgment: A Six-Step Prescription for a Well-Founded and Defensible Process.” Technological Forecasting and Social Change 147 (April): 72–82.
  • Camerini, D., S. Favarin, and M. Dugato. 2015. “Maritime Piracy Worldwide.” Transcrime Research in Brief - N.1/2015. Trento (IT), October.
  • Chang, Y. H., and M. Y. Liao. 2009. “The Effect of Aviation Safety Education on Passenger Cabin Safety Awareness.” Safety Science 47 (10): 1337–1345.
  • Coursaris, C. K., and W. Van Osch. 2016. “A Cognitive-Affective Model of Perceived User Satisfaction (CAMPUS): The Complementary Effects and Interdependence of Usability and Aesthetics in IS Design.” Information and Management 53 (2): 252–264.
  • Hamid Khin Maung Sein, A. G., M. Bt Mustafa, and S. Wai Mon. 2016. “Entrusting Coast Guards with Maritime Law Enforcement Powers: Lessons for Malaysia.” IIUM Law Journal 24 (1): 83–106.
  • Jabareen, Y. 2009. “Building a Conceptual Framework: Philosophy, Definitions, and Procedure.” International Journal of Qualitative Methods 8 (4): 49–62.
  • Jiang, M., and J. Lu. 2020. “The Analysis of Maritime Piracy Occurred in Southeast Asia by Using Bayesian Network.” Transportation Research Part E: Logistics and Transportation Review 139 (1): 101965.
  • Joshi, A., S. Kale, S. Chandel, and D. Pal. 2015. “Likert Scale: Explored and Explained.” British Journal of Applied Science & Technology 7 (4): 396–403.
  • The Maritime Exececutive. 2005. “Insurance Rates for Malacca Strait Traffic to Rise Dramatically.” The Maritime Executive, 1–6.
  • Md Asri, M. H. and M. K. Ruslan. 2018. “Prosecuting Piracy at the High Seas: the Experience of Malaysia.” IIUM Law Journal 26 (2): 307–334.
  • Norani, N. 2012. “Validation of Lean Manufacturing Implementation Framework Using Delphi Technique.” Jurnal Teknologi 59: 1–6.
  • Oxford. 2020. Oxford English and Spanish Dictionary, Thesaurus, and Spanish to English Translator, 4–7.
  • ReCAAP. 2015. Annual Report Piracy and Armed Robbery Against Ships in Asia: 1 January 2014–31 December 2014. December. http://www.recaap.org.
  • ReCAAP. 2016. Annual Report Piracy and Armed Robbery Against Ships In Asia 2016.
  • ReCAAP. 2017. Annual Report Piracy and Armed robbery Against Ships in Southeast Asia 2017. Modern Piracy: Legal Challenges and Responses, December, 13–34. https://doi.org/10.4337/9781849804936.00009.
  • ReCAAP. 2019. Annual Report, Piracy and Armed Robbery Against Ships in Asia 2019.
  • ReCAAP ISC. 2018. Annual Report, Piracy and Armed Robbery Against Ships in Asia 2018. http://www.recaap.org/resources/ck/files/reports/annual/ReCAAP ISC Annual Report 2018.pdf.
  • ReCAAP ISC. 2020. “RecAAP 2019 Nautical Forum 2020.” Block Caving – a Viable Alternative? 21 (1): 1–9. https://www.golder.com/insights/block-caving-a-viable-alternative/.
  • Skinner, R., R. R. Nelson, W. W. Chin, and L. Land. 2015. “The Delphi Method Research Strategy in Studies of Information Systems.” Communications of the Association for Information Systems 37: 31–63.
  • Skulmoski, G. J., F. T. Hartman, and J. Krah. 2007. “The Delphi Method for Graduate Research.” Journal of Information Technology Education 6: 1–21.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.