Get 20M+ Full-Text Papers For Less Than $1.50/day. Start a 14-Day Trial for You or Your Team.

Learn More →

Cyberattacks on ships: a wicked problem approach

Cyberattacks on ships: a wicked problem approach PurposeThe maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security vulnerabilities for the maritime industry in cyberspace. Any obstruction in the global supply chain due to a cyberattack can cause catastrophic problems in the global economy. This paper aims to review automatic identification systems (AISs) aboard ships for cyber issues and weaknesses.Design/methodology/approachThe authors do so by comparing the results of two receiver systems of the AIS in the Port of Houston; the JAMSS system aboard the Space Station and the “Harborlights” system for traffic control in the Port.FindingsThe authors find that inconsistent information is presented on the location of same ships at the same time in the Port. Upon further investigation with pilots, the authors find that these inconsistencies may be the result of the strength of power with which an AIS is transmitted. It appears the power may be reduced to the AIS in port but that it varies within port and varies by pilot operators. This practice may open the AIS system for tampering.Originality/valueFurther, this inconsistency may require further policy regulation to properly address cyber information in a port. http://www.deepdyve.com/assets/images/DeepDyve-Logo-lg.png Maritime Business Review Emerald Publishing

Cyberattacks on ships: a wicked problem approach

Loading next page...
 
/lp/emerald-publishing/cyberattacks-on-ships-a-wicked-problem-approach-XHTsyutcvi

References (84)

Publisher
Emerald Publishing
Copyright
Copyright © Emerald Group Publishing Limited
ISSN
2397-3757
DOI
10.1108/MABR-08-2018-0026
Publisher site
See Article on Publisher Site

Abstract

PurposeThe maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security vulnerabilities for the maritime industry in cyberspace. Any obstruction in the global supply chain due to a cyberattack can cause catastrophic problems in the global economy. This paper aims to review automatic identification systems (AISs) aboard ships for cyber issues and weaknesses.Design/methodology/approachThe authors do so by comparing the results of two receiver systems of the AIS in the Port of Houston; the JAMSS system aboard the Space Station and the “Harborlights” system for traffic control in the Port.FindingsThe authors find that inconsistent information is presented on the location of same ships at the same time in the Port. Upon further investigation with pilots, the authors find that these inconsistencies may be the result of the strength of power with which an AIS is transmitted. It appears the power may be reduced to the AIS in port but that it varies within port and varies by pilot operators. This practice may open the AIS system for tampering.Originality/valueFurther, this inconsistency may require further policy regulation to properly address cyber information in a port.

Journal

Maritime Business ReviewEmerald Publishing

Published: Nov 19, 2018

There are no references for this article.