Prior to 2009, piracy appeared to be a limited problem and less of a menace to the international community. However, Hostis humani generis has been traditionally qualified due to the occasional surge of piracy activities. Since the 1990s, in particular, ships and their crew members have been held for ransom by small armed groups in territorial seas. The groups responsible for these activities claim to be protecting the fishing resources of Somalia  . At the time, these waters were pillaged by foreign fisherman and the coastal waters were used as a waste dumping ground because the government was unable to enforce the existing law. Establishing the rule of law was key to the proper functioning of the economy but according to  , Somalia was greatly affected due to the breakdown in the rule of law with a ripple effect on its economy. These people were able to take advantage of the ineffective government, thereby increasing piracy within the Somalian waters as governmental attentions were focused elsewhere, such as political fights occurring on land. As a result of this inattention, piracy became bolder and became a significant menace beginning “from the Suez Canal and going through the Gulf of Aden to the narrow area between the Horn of Africa and the Arabian peninsula”  . Prima facie, the dynamics of piracy and armed robbery off the Somali coast can be attributed to the pivotal reason that Somaila is a failed state and thrives on the fortunes of piracy which is viewed as a lucrative business  . Three key elements must be present at one location for piracy to occur at sea. Firstly, there should be a pirate, a shipping vessel which is vulnerable, and good environmental conditions  . Piracy appears to be reoccurring in cycles. In the past this menace was defeated  . In the quest to normalise the shipping routes and keep them safe, a multinational force was deployed along the Horn of Africa corridor, with its associated resilience and challenges among the military personnel  . Within these areas, piracy has become increasingly advanced, partly due to technological advancements and partly due to increased daring by pirates, allowing ships to be attacked over a great distance. The limitations of their fibre glass skiffs due to their fuel capacity and speed made the pirates operate initially within a few nautical miles off the coastline  . Due to the increasing success in capturing ships and crews of ships, allowing for obtaining of ransom, pirates are once again the sub specie of Somali pirates―otherwise known as Hostes humani generis. International states have become increasingly alarmed due to the increased navigation danger through a significant choke-point of international traffic. Moreover, greater outrage has been induced due to pirate attacks on humanitarian ships, carrying supplies to the Somali people. There have been increasing incidences of piracy in these chokeholds due to governmental attention on other matters, such as political uprising or economic uncertainty. The Somalian coast, as explored in the following paragraph, is a valuable example of how piracy can occur even though governments are supposedly fighting the crime  . Ship owners and operators seek interest in the cost benefit and maritime safety of their ships through risk analysis when considering routes for their ships especially through pirate infested waters  .
According to the Security Council, pirate activities off the Somalian coast are linked to threats to international peace and security. Resolution 733/1992 has allowed the Security Council to invoke Chapter VII in order to address the Somalian coast piracy situation, suggesting the threat to international peace and security. Moreover, it is suggested that the piracy activities threaten the peace and security of the Somalian region. Therefore, the Chinese Minister of Foreign Affairs approved Resolution 1851 in 2008 to decrease the threat to international peace and security―both on an international and a regional level. The goal of this action was to show that actions to fight “piracy off the Somali coasts be conducted within the framework of Chapter VII of the UN Charter”. China has sought to play a greater role in its bid to rid the seas of the scourge of maritime piracy through peacekeeping and related counter piracy operations   . Seaborne trade is very vulnerable to piracy and armed robbery and often presents as a potential target to attacks by terrorist. It is necessary to apply observation trends and lessons learned to curb this menace   .
Due to these attacks, there are increased concerns about the effectiveness of piracy laws which exist on an international level through the UN Convention on the Law of the Sea (also known as UNCLOS) in Articles 100 to 107, as well as 110. It is interesting to note that the UNCLOS articles are identical to the Geneva Convention of the High Seas of 1958 (Articles 14 to 22). Moreover, while some states are not bound by UNCLOS, they are bound by the Geneva Convention, suggesting that all articles in relation to sea law are the same or essentially the same. With a similarity to other crime forms, pirate attacks tend to cluster in space. If an attack occurs at one location, it heightens the risk of a similar act occurring at the same location or an area close to it   . Yet, there are increasing concerns regarding the higher rates of piracy occurring in different areas of maritime waters despite the similarities in laws.
To the international community, Somalia remains an intractable challenge. The present state provides a fertile breeding ground for organized crime with sea piracy spear heading and disrupting maritime trade and security  . Devastating droughts coupled with a protracted civil war ushered in dire consequences bothering on humanitarian crisis  . Maritime security is two pronged, having an intrinsic and extrinsic dimension, which are threatened by sea piracy. The spill of saying an oil-laden ship by pirates spells an environmental disaster in the intrinsic dimension, while the direct users of the marine environment suffer in the extrinsic dimension  .
2. Research Problem, Questions, and Significance
Piracy attacks in the Gulf of Guinea are increasing, even though armed robbery and piracy at the Gulf of Aden is on a gradual decline. According to  , there was a significant increase of 30% in the acts of piracy between 2008 and 2013. In 2012 West African piracy attacks for the first time exceeded those off the Horn of Africa, with 966 sailors attacked in West Africa against 851 off the Somali Coast  . Combating piracy along the Gulf of Guinea (GoG) involves an extensive coastline which needs constant monitoring with the use of modern technologies as the Vessel Traffic System (VTS)  . The   specifies that the Piracy Reporting Centre updated their records to 58 attacks by pirates, consisting of ten hijackings. With 11 attacks reported for the first quarter of 2013, and 27 attacks in 2012 (almost three times more than in 2011), the country Nigeria is seen as the most affected country. However, it is believed that other coastline countries and areas most affected apart from Nigeria in the Gulf of Guinea comprise Ghana, Togo, Benin and Bakassi. This is evident as pirates have increased their operations on the Ghanaian waters, which negatively affects maritime transportation and maritime security, and the recent discovery of oil will increase the risk of piracy on its high sea  .
The research questions to be addressed include:
1) What are the causes of piracy in the Gulf of Guinea and obstacles to effective resolution?
2) What are the effects of oil piracy in the Gulf of Guinea on maritime transportation (concerning the effects on reputation damage to maritime transport company, insurance costs, transport price increase, extra cost on changing route, trade disruption and the loss of crude oil)?
3) What are the effects of oil piracy in the Gulf of Guinea on maritime security (considering the effects on security cost, more integration with the navy, dangers of sailing more nautical miles, threat to crew and lives, security equipment)?
4) What are the strategies required to manage these threats?
2.1. Data Collection Criteria and Analysis
The data used for this study will be obtained from the International Maritime Bureau and the IMB Piracy Reporting Centre. The time period being assessed is 2006 to 2015. The data will include all countries; however, particular emphasis will be placed on the Gulf of Guinea. The data indicator is the number of piracy incidences within the stated country. Therefore, the indicator is defined by actual attacks occurring globally. The data analysis was conducted using Real Stats add-in for Excel 2013 edition.
It is assumed that the data obtained from the IMB is accurate and up-to-date. It is assumed that the reporting person has been honest in the report and has provided all necessary information. It is assumed that all piracy attacks have been reported for the time period. Since the study is based on a quantitative method, it is assumed that the models used to forecast possible future piracy attacks are the most valid and flexible to meet the expectations of this particular study.
2.3. Practical Significance
The goal of this study is to provide ways that future piracy attacks can be predicted. In this respect, the purpose of the paper is to determine how many attacks can be expected in future time periods, which is beneficial in allowing governmental agencies ample opportunity to develop new tactics to prevent piracy or capture privateers. Through capturing privateers, it is possible that these individuals can shed light on reasons behind piracy. Moreover, with knowing the anticipated number of attacks, it is possible that governmental agencies can develop protections, such as an increased naval fleet, in order to protect ships that are operating in potentially dangerous waters.
3. Ordinal Logistic Regression
The ordinal logistic regression is a statistics model that is commonly known as the ordered logit model or proportional odds model. This model is a regression model utilised for ordinal dependent variables. The model was established by Peter McCullagh. Within the model, it is assumed that if a survey’s question is designed to be answered with a set choice (such as “poor” or “excellent”) and the analysis’s purpose is to determine the rate of prediction for a particular response based on responses to other questions, it is possible to use ordinal logistic regression      . Ordinal logistic regression can be considered as an extension of the initial logistic regression model, commonly applicable to dichotomous dependent variables. As a result, it is possible to analyse more than two ordered response categories.
The ordinal logistic regression model only applies to data meeting the proportional odds assumptions. The proportional odds assumptions assume that the proportions are divided by the response (such as “very poor”, “poor”, “good” “very good” or “excellent”) into classifications, such as p1, p2, p3, p4 or p5, respectively. The logarithms of the odds, rather than the logarithms of the probabilities, of answering in a particular way. This is shown below:
Therefore, according to the proportional odds assumption is that the number added to each logarithm to obtain the next number is the same, allowing the logarithms to form an arithmetic sequence. According to the model, the number that exists in the last column, representing the number of required additions for the logarithm, is determined through a linear combination of observed variables      . The coefficients found in the linear combination cannot be estimated on a consistent basis through the ordinary least squares, resulting in a typical estimation by maximum likelihood. Maximum likelihood estimates are computed through iteratively reweighted least squares. Ordered response categories may be credit ratings (such as for bonds), Likert scales from opinion surveys, levels of spending (such as “high” or “low”), or employment status. A logistic regression model is used to analyze the ordinal outcome. In fitting a binary logistic regression model, there is a need to predict the probability of the outcome of interest by estimating a set of regression coefficients. The logistic model can be written in different ways. The version that shows what function of the probabilities’ results in a linear combination of parameters and is as follows:
In this equation, β refers to the parameter (based on the data from Equation (1)). At the same time, X refers to the number of occurrences. The logit refers to the left side of Equation (2). It refers to the log of the odds that an event occurs. This is calculated as the ratio of occurrences of an event based on the number that do not. The coefficients in the logistic regression model give how much the logit changes based on the values of the predictor variables.
3.2. Application to the Data
The data is shown (Table 1) for all countries and consider a specific time period. The range of occurrences is 0 to 160. The coefficients will be based on 20 ranges.
Table 1. Ranges for ordinal logistic regression (Source; Adapted from   ).
These are: P1 = 0 - 8; P2 = 9 - 16; P3 = 17 - 24; P4 = 25 - 32; P5 = 33 - 40; P6 = 41 - 48; P7 = 49 - 56; P8 = 57 - 64; P9 = 65 - 72; P10 = 73 - 80; P11 = 81 - 88; P12 = 89 - 96; P13 = 97 - 104; P14 = 105 - 112; P15 = 113 - 120; P16 = 121 - 128; P17 = 129 - 136; P18 = 137 - 144; P19 = 145 - 152; and P20 = 153 - 160.
The assumptions are defined as 0 to 19 (explained through Equation (1)) and are shown below (Table 2).
These are shown in the following Figure 1: (Source: Adapted from  ).
Table 2. Ordinal logistic regression assumptions (Source: Adapted from  ).
Figure 1. Assumptions for ordinal logistics model  .
Based on the information from the preceding sections, the variable can be determined, as follows (Table 3).
When inputting the information from Table 2  and the raw data from the Appendix, the following comparison can be seen for the binary logistic regression and the multimodal logistic regression.
The key takeaway from Table 4  is that the results from the binary logistic regression is significant, as evident. At the same time, the multimodal logistic regression is significant, based on the p-value. The R Sq values were interesting to note as well. On a whole, the R Sq results for the binary logistic regression were higher than for the multimodal logistic regression. The whole of this information provides the ROC curve, shown in the following Table 5 and Figure 2.
The purpose of this model is to forecast the future anticipated attacks on the Gulf of Guinea. This is shown in the following Figure 3.
The purpose of Figure 3   is to show the number of piracy attacks within the areas around the Gulf of Guinea. These include Equatorial Guinea, Ghana, Guinea, and Guinea Bissau. It is noted that between 2006 and 2007, there was a sharp decline for both Ghana and Guinea in terms of total piracy attacks. This decline continued for Guinea, yet ended for Ghana. Moreover, between
Table 3. Ordinal logistics model variables (Source: Adapted from  ).
Table 4. Binary logistic regression vs. multimodal logistic regression (Source: Adapted from  .
Table 5. ROC curve (Source: Adapted from  ).
Figure 2. ROC model (Source: Adapted from  ).
Figure 3. Piracy attacks on the gulf of Guinea (Source:   ).
2007 and 2008, there was an increase in piracy attacks in Equatorial Guinea. The most number of attacks occurred in 2008 in Ghana, followed by 2010 in Equatorial Guinea, before experiencing a decrease for most areas. Following the spike, Ghana’s rate of piracy attacks decreased significantly, temporarily increasing in 2014. Within Equatorial Guinea, the spike decreased significantly, then increased again. Based on the ordinal logistic regression model, it is possible to predict the number of attacks. This is shown below (Table 6).
Based on this information, it can be assumed that piracy attacks will increase/decrease by approximately 5 per year. This can be seen forecasted from 2016 to 2030 for high and low. For 2016, the values are based on 2015. For 2017 and after, the values are based on the previous forecasted attacks, as shown in the Table 7. The graph Figure 4 only shows the total forecasted attacks.
Table 6. Gulf of Guinea piracy attack predictions based on ordinal logistic regression model (Source: Author’s compilation from   ).
Table 7. Forecasted piracy attacks on gulf of Guinea (Source: Author’s compilation from   ).
Figure 4. Projected increase in piracy attacks (Source: Author’s compilation from   ).
4. Series Hazard Modelling for Maritime Transport Risk Analysis
According to  , the hazard of global hijacking by aeroplanes and maritime piracy has been assessed through series hazard modelling for the South China Sea and Malacca Strait. Within the United Kingdom, series hazard modelling has been used to examine republican terrorist attacks. According to  , series hazard modelling has been used to assess global terrorist attacks in Justice Commandos for the Armenian Genocide (JCAG) and Armenian Secret Army for the Liberation of Armenia (ASALA). Other researchers, such as  and  , from Hamas, Fatah and the Palestinian territories and the Palestinian Islamic Jihad in Israel used series hazard modelling to assess frequent terrorist attacks in Israel. The series hazard modelling method is an important tool for modelling events where events that have taken place will probably be known to those who precipitate future events, because it can directly measure dependence across events. Furthermore, the model can be used to estimate intervention effects across independent events. After getting the appropriate context and data, the hazard model can be used to assess the hidden variation in the duration between events and in the details of each event  . The following equation shows the series hazard model:
However, this model is projected using the Cox proportional hazard model. The main difference is that series hazard model is estimated across failures whilst the Cox proportional hazard model is estimated across subjects. Because the history of previous failures has to be captured in the model, to ensure conditional independence, the preceding equation can be expanded into Equation (4) below; where series of functions of previous failures is represented by Z, especially those that are relevant theoretically, to the current analysis (in this case maritime piracy events and effects). The partial likelihood function can then be derived from the series hazard function in the following equation:
The purpose of the matrix Zky is to measure information about the history of failures to account for dependencies across failures. The matrix Xk consists of information on the specific failure or event, the policy context, political, social reasons at the time of failure (comprising the strategic profile). It is assumed within this model that 1) the unit of observation is each failure, not each time increment, and 2) dummy variables may be introduced when necessary.
4.2. Application of the Data
For this study, failures were originally found in Table 5  for the ROC curve. Using Equation (4), represents FPR, whereas X are the total number of attempts (FPR and TPR) and is also found in Table 5  . In the following table, the log of these values is being considered. Moreover, β will be considered AUC in Table 5  . Zky will be p-Pred found in Table 5  . Once the formula is calculated for the entire dataset, the logs will be found and summed. Following the determination of this summation, the forecast will be determined based on the sum of the logs and conducted as done with the preceding model. The following Table 8 presents the results of the equation for the dataset.
Table 8. Series hazard model (Source: Adapted from   ).
The formula results in the following Figure 5.
Based on these results, it is estimated that the prediction rate is accurate for determining the success of piracy attacks. The forecast predictor is shown in the following Table 9 and is based on the sum of the logs (shown in Table 8   ) to the power of 1 through 5 (finding the absolute value of the total for each country).
Figure 5. Series hazard modeling (Source: Adapted from  ).
Table 9. Forecast based on series hazard modeling (Source: Author’ compilation   ).
5. Bayesian Networks (BNs) Technique for Maritime Risk Analysis
    and  suggest that another risk modelling tool that can be used for maritime transportation analysis is Bayesian Networks, which have a number of favourable features. Through situational factors, Bayesian Networks can allow for the contextualization of specific consequences occurrences, such as
Table 10. Forecasted piracy attacks on gulf of Guinea (Source: Author’s compilation   ).
Figure 6. Projected increase in piracy attacks (Source: Author’s compilation from   ).
piracy and its related effects, represented by observable aspects. In addition, by providing a means for performing sensitivity analysis, BNs allows for the integration of different types of evidence through various types of probabilities.
 suggests that BNs constitute probabilistic graphical models, defined as a pair , where is the graphical constituent and P the probabilistic constituent of the model. Where the arcs (A) represent the conditional (in) dependence relationships between these, the nodes represent the variables , becomes a directed acyclic graph (DAG), shown below:
In this formula, for each variable in the network; P is a set of conditional probability tables; ; and
represents the set of parents of Vi in G. Therefore,
. A BN encodes a factorization of the joint probability distribution (JDP) over all variables in V. A sensitivity analysis can then be performed for further information  .
5.2. Application to the Data
Within this study, again, probability can be found in both Table 5  and Table 8   . For this scenario, the probability is considered p-Pred and is multiplied by the variables found in the appendix. For each row, the sum will be determined then log(sum) again. If this value is between −0.15 to 0.20, this value is reliable and the predictor can be used to determine the forecast predictor. If the value is outside of the range, the log will be found of the log(sum), which will be added to the p-Pred used for the forecast model. The following Table 11 shows the initial results.
Based on these results, it is estimated that the prediction rate will need to have 0.33052 added for determining the success of piracy attacks. The forecast predictor is shown in the following Table 12.
The chapter considers three separate models: Ordinal Logistic Regression; Series Hazard Modelling for maritime transport risk analysis; and Bayesian Networks (BN’s) technique for maritime risk analysis to analyse one set of data. It is noted that all of the models used yielded similar forecasted results. Moreover, all models showed that the Gulf of Guinea is expected to have a significant increase in piracy through 2030. As explored in the introductory chapter, this could be due to increases in oil piracy. Therefore, it will be important for ship owners and crews to be vigilant while on route to destinations in these areas or through these waters in order to prevent these crimes from occurring. The long coastline and territorial seas bordering the Gulf of Guinea will have to be effectively monitored
Table 11. Bayesian model predictor (Source: Author’s compilation with data from   ).
Table 12. Forecast based on Bayesian model (Source: Author’s data compilation   ).
Table 13. Forecasted piracy attacks on gulf of Guinea (Source: Compilation from   ).
Figure 7. Projected increase in piracy attacks. Source: (Author’s data compilation from   ).
by their navies or coastguard. This will help alleviate or terminate any surprises which could be sprung on them by pirates that could disturb traffic flow.