Access the full text.
Sign up today, get DeepDyve free for 14 days.
Sanghack Lee, Jung-ran Cho (2017)
Optimal number of ports and implications for Korea’s port policyJournal of Korea Trade, 21
(2013)
White paper: Strategic leadership in managing cultural resistance to IT implementations in the government of Bahrain
(1970)
Prolegomena to policy science
E. Tzannatos (2003)
A decision support system for the promotion of security in shippingDisaster Prevention and Management, 12
T. Sommestad, Henrik Karlzén, J. Hallberg (2015)
The sufficiency of the theory of planned behavior for explaining information security policy complianceInf. Comput. Secur., 23
Z. Darvas (2009)
The impact of the crisis on budget policy in Central and Eastern Europe. Bruegel Working Paper 2009/05, 31 July 2009
Andrew McAfee (2006)
Enterprise 2.0: the dawn of emergent collaborationIEEE Engineering Management Review, 34
L. Gymnopoulos, Vassilis Tsoumas, Yannis Soupionis, S. Gritzalis (2005)
A generic Grid security policy reconciliation frameworkInternet Res., 15
Douglas Hales, Young-Tae Chang, J. Lam, Olivier Desplebin, N. Dholakia, Adel Al-Wugayan (2017)
An Empirical Test of the Balanced Theory of Port Competitiveness [Pre-pub version]
D. Meter, C. Horn (1975)
The Policy Implementation Process: A Conceptual FrameworkAdministration & Society, 6
A. Mauda (2016)
Is Implementation still the missing link? Understanding public policy processes: Education Reform in Post-Apartheid South Africa.
Hui Loh, V. Thai (2015)
Management of disruptions by seaports: preliminary findingsAsia Pacific Journal of Marketing and Logistics, 27
Donald Meter, Carl Horn (1975)
The Policy Implementation ProcessAdministration & Society, 6
Kevin Smith, C. Larimer (2009)
The Public Policy Theory Primer
S. Soekanto, S. Mamudji (2011)
Penelitian Hukum Normatif
V. Pathari, R. Sonar (2012)
Identifying linkages between statements in information security policy, procedures and controlsInf. Manag. Comput. Secur., 20
John Harlow (2001)
Security policy ‐ an individual viewVine, 31
Hokey Min (2012)
Maritime Logistics and Supply Chain Security
Linda Lotto (1986)
Qualitative Data Analysis: A Sourcebook of New Methods, 8
Y. Dror (1970)
Prolegomena to policy sciencesPolicy Sciences, 1
F. Ariyanti (2015)
Pengusaha logistik: ada preman terselubung di pelabuhan
A. Goulielmos, A. Pardali (1998)
The framework protecting ports and ships from fire and pollutionDisaster Prevention and Management, 7
J. Burns, Zhou Zhiren (2010)
Performance Management in the Government of the People's Republic of China: Accountability and Control in the Implementation of Public PolicyOecd Journal on Budgeting, 10
MIT Sloan Management Review, 47
Francesco Pesci (2016)
Measuring the ECB's Monetary Policy Stance: A 'Media-Based' Automated ApproachEuropean Economics: Macroeconomics & Monetary Economics eJournal
Alexandros Goulielmos, A. Anastasakos (2005)
Worldwide security measures for shipping, seafarers and portsDisaster Prevention and Management, 14
Richard Bennett (2017)
Tourism and logistics in an age of unprecedented crimeWorldwide Hospitality and Tourism Themes, 9
S. Agarwal (2001)
Intranet usability ‐ tackling the management issues around implementing usable design on an IntranetVine, 31
F. Guillier (2016)
Flood Action Programs (PAPI): rating the flood’s collective vulnerability through the implementation of an integrated public policy tool, 7
Khaled Alshare, P. Lane, M. Lane (2018)
Information security policy compliance: a higher education case studyInf. Comput. Secur., 26
B. Gelb, D. Bush (2006)
The marketing consequences of competitor lawsuitsMIT Sloan Management Review, 47
Hasan Al-Mukahal, Khaled Alshare (2015)
An examination of factors that influence the number of information security policy violations in Qatari organizationsInf. Comput. Secur., 23
C. Walter, R. Poist (2004)
North American inland port development: international vs domestic shipper preferencesInternational Journal of Physical Distribution & Logistics Management, 34
L. Camp (2003)
Code, coding and coded perspectivesJ. Inf. Commun. Ethics Soc., 1
G. Mutahaba (2012)
Strenghening public administration using performance management systems in Africa
This study aims to formulate the implementation model of Ship and Port Facility Security Policy based on ISPS Code in PT Pelindo II (Cirebon Branch).Design/methodology/approachThe location of the study was the port area of PT Pelindo II (Cirebon Branch). It was because the controlling policy became the duties and responsibilities of each region in which it was the responsibility of PT Pelindo II (Cirebon Branch). However, because of the problem of controlling, it became a common responsibility that could be divided into other institutions such as Navy, Police, Kodim, Satpol PP and leadership apparatus ranging from local to central authorities. Data collection in this study was done by some methods, namely: interview and direct observation. This was done to provide a real and detailed picture of the implementation of Ship and Port Facility Security that is based on ISPS Code to discipline gerandong in PT Pelindo II (Cirebon Branch). The researcher conducted the data collection activity by compiling the document on the field.FindingsShip and Port Facility Security Policy of ISPS Code throughout Indonesia, including PT Pelindo II (Cirebon Branch), has been enacted by Ministry of Transportation since 2004 by the Decree of Minister of Transportation Number 33/2003 on the application of Amendment of SOLAS 1974 on the Ship and Port Facility Security in Indonesian territory (ISPS Code) in top-down way for good port governance that is free from any safety, health and security threats, especially gerandong because of which the implementation of ISPS Code is not working properly. The Ship and Port Facility Security Policy that is based on ISPS Code is a mandate of UN convention and the mandate of the law and order of the Minister of Transportation to conduct the port security, especially in securing the ship and port facility based on ISPS Code so that Cirebon Branch will be a world-class port. The implementation process of ship and port facility security that is based on ISPS Code in PT Pelindo II (Cirebon Branch) does not run optimally, especially in disciplining gerandong because of the lack of the socialization that was done to the target community groups and related makeshift.Originality/valueFrom the results of analysis of several journals that became a reference for this study, there are at least three problems that need special attention, namely, general implementation problems (especially in developing countries), implementations that do not work because of leadership and implementation that cannot run if there is no benchmarking. The researcher is interested in analyzing the problem that has lasted almost for 10 years and has never been resolved until now. Many of the problems behind the phenomenon of gerandong occurred because of the interaction of government (civil society), civil society, Community Empowerment Institutions (LSM), Market (PT Pelindo) and certain community groups as well as the involvement of the apparatus. The most important of all that has been explained above is that in accordance with the feasibility of study (FS), the environmental impacts of the Development Main Plan (RIP) of Cirebon Port and its social impact analysis on the community has not been discussed. Therefore, the FS is expected to be complete and to become plenary and be more feasible to be accepted with this gerandong study.
Journal of Management History – Emerald Publishing
Published: Jan 29, 2019
Keywords: Security policy; Ship and port facility
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.