skip navigation


Register for Latest Research

Stay Informed
Register with NCJRS to receive NCJRS's biweekly e-newsletter JUSTINFO and additional periodic emails from NCJRS and the NCJRS federal sponsors that highlight the latest research published or sponsored by the Office of Justice Programs.

NCJRS Abstract

The document referenced below is part of the NCJRS Virtual Library collection. To conduct further searches of the collection, visit the Virtual Library. See the Obtain Documents page for direction on how to access resources online, via mail, through interlibrary loans, or in a local library.


NCJ Number: 98460 Find in a Library
Title: Security at Sea
Journal: Security Management  Volume:29  Issue:6  Dated:(June 1985)  Pages:68-72
Author(s): R D Day
Date Published: 1985
Page Count: 5
Format: Article
Language: English
Country: United States of America
Annotation: Security measures, from passenger check-in to disembarkation, are described for the cruise ship Queen Elizabeth 2 (QE2). Security at sea is shown to have similar concerns and procedures with land-based systems.
Abstract: The security operations of the QE2's security staff include checking passengers' tickets before passengers are admitted to the pier area and checking luggage and passengers with metal detectors. The safety security officer's involvement with crew discipline is considered to be essential. Above all, controlling access to prevent unauthorized persons and contraband from boarding is a prime security responsibility. The most common crime encountered by security among the passengers involves fraudulent claims made of lost or stolen valuables. Passengers boarding the QE2 receive a contract which states that in the interest of international security and safety at sea reasonable searches may be made of their persons, baggage, and other property; passengers also agree to the removal and confiscation or destruction of any object that may impair the safety of the vessel or inconvenience others.
Index Term(s): Cargo security; Personal Security/Self Protection; Security; Security systems
To cite this abstract, use the following link:

*A link to the full-text document is provided whenever possible. For documents not available online, a link to the publisher's website is provided. Tell us how you use the NCJRS Library and Abstracts Database - send us your feedback.