Access the full text.
Sign up today, get DeepDyve free for 14 days.
R. Smierzchalski (1999)
Evolutionary trajectory planning of ships in navigation traffic areasJournal of Marine Science and Technology, 4
(2014)
Hide and seek: managing automatic identification system vulnerabilities
B. Niekerk (2017)
Analysis of Cyber-Attacks against the Transportation Sector
(2011)
The Uncharted Waters of Cyberspace: Applying the Principles of International Maritime Law to the Problem of Cybersecurity
Oliver Fitton, D. Prince, Basil Germond, Mark Lacy (2015)
The future of maritime cyber security
R. Kolko (2014)
Countering the Maritime Cyber Threat
John Moteff (2012)
Critical Infrastructure Resilience: The Evolution of Policy and Programs and Issues for Congress
(2016)
Seventh framework programme theme 7: transport (including aeronautics) TTG4 e-Maritime: proposals for R&D road map
(2015)
Cybersecurity in transportation
L. Labaka, J. Hernantes, A. Laugé, J. Sarriegi (2011)
Policies to Improve Resilience against Major Industrial Accidents
A. Nagurney, S. Shukla (2017)
Multifirm models of cybersecurity investment competition vs. cooperation and network vulnerabilityEur. J. Oper. Res., 260
Joseph DiRenzo, Dana Goward, F. Roberts (2015)
The little-known challenge of maritime cyber security2015 6th International Conference on Information, Intelligence, Systems and Applications (IISA)
M. Bruijne (2006)
Networked reliability: institutional fragmentation and the reliability of service provision in critical infrastructures
J. Alford, A. Fenna, P. Weller, A. Podger (2009)
Wicked Problems in Public Policy
Andrew McAfee, Erik Brynjolfsson (2008)
Invertir en la TI que sí hace una diferencia competitivaHarvard Business Review, 86
A. Gharehgozli, Joan Mileski, Alyssa Adams, W. Zharen (2017)
Evaluating a “wicked problem”: A conceptual framework on seaport resiliency in the event of weather disruptionsTechnological Forecasting and Social Change, 121
O. Adegboyega (2015)
Representing Botnet-Enabled Cyber-Attacks and Botnet Takedowns Using Club TheoryTechnology Innovation Management Review, 5
M. Bruijne, M. Eeten, E. Roe, P. Schulman (2006)
Assuring high reliability of service provision in critical infrastructuresInt. J. Crit. Infrastructures, 2
H. Rittel, M. Webber (1973)
Dilemmas in a general theory of planningPolicy Sciences, 4
(2014)
Shifting the paradigm: the DHS continuous diagnostics and mitigation program
(2014)
Control system cybersecurity: Legacy systems are vulnerable to modern-day attacks
(2017)
Keynote: Ray Rothrock”, Proceedings at Cybersecurity of Critical Infrastructure Summit
M. Bruijne, M. Eeten (2007)
Systems that Should Have Failed: Critical Infrastructure Protection in an Institutionally Fragmented EnvironmentJournal of Contingencies and Crisis Management, 15
(2014)
Zero-day vulnerabilities: what to do when it’s too late to prevent an attack
(2015)
Cyber risks a threats: a demanding challenge for the Maritime industry
(2017)
Interview performed in February 2017
S. Batie (2008)
Wicked Problems and Applied EconomicsAmerican Journal of Agricultural Economics, 90
(2014)
Cyberspace – the imminent operational domain: a construct to tackle the Coast guard’s tough challenges
(2015)
Maritime cybersecurity: a growing threat goes unanswered
Richard Kuhlman, J. Kempf (2015)
FINRA publishes its 2015 “Report on Cybersecurity Practices”Journal of Investment Compliance, 16
International Journal of Communication Systems, 25
(2014)
C-Cubed: Increasing cyber resilience, awareness, and managing risk
(2016)
2016), “Analysis of cyber-attacks against the transportation sector”, in Threat Mitigation and Detection of CyberWarfare and TerrorismActivities
(2015)
Look-Out-2016 Maritime Domain Cyber: Risks, Threats and Future Perspectives, Lampe& Schwartze KG, Bremen
O. Khan, Daniel Estay (2015)
Supply Chain Cyber-Resilience: Creating an Agenda for Future ResearchTechnology Innovation Management Review, 5
S. Shah (2004)
The Evolving Landscape of Maritime Cybersecurity, 25
(2015)
A demanding challenge for the Maritime industry
(2016)
The story you aren’t being told about Iran capturing two American vessels
Marc Bellette (2010)
Opinion: Community Bushfire Safety and Possible Future Steps for Research Led PolicyThe Australian journal of emergency management, 25
B. Head (2008)
Wicked Problems in Public PolicyPublic Policy, 3
(2011)
The uncharted waters of cyberspace: applying the principles of international Maritime law to the problem of cybersecurity”, Georgia
L. Kaiser (1969)
2013-2023 Transportation Industrial Control Systems (ICS) Cybersecurity Standards Strategy
(2017)
Keynote: Ray Rothrock
(2015)
Cybersecurity in transportation”, in Protecting Our Future: Educating a Cybersecurity Workforce
S. Manyena (2006)
The concept of resilience revisited.Disasters, 30 4
Daniela Cîmpean, J. Meire, Vincent Bouckaert, Stijn Casteele, A. Pelle, Luc Hellebooge (2011)
Analysis of Cyber Security Aspects in the Maritime Sector
M. Bruneau, Stephanie Chang, R. Eguchi, George Lee, T. O'rourke, A. Reinhorn, M. Shinozuka, K. Tierney, W. Wallace, D. Winterfeldt (2003)
A Framework to Quantitatively Assess and Enhance the Seismic Resilience of CommunitiesEarthquake Spectra, 19
(2014)
Maritime critical infrastructure cyber risk: threats, vulnerabilities, and consequences
Cari Koelsch (2014)
Potential Impact of Changes in Risk Assessment to Address Wicked Problems: A Case Study of British Petroleum’s Assessment Strategies
(2015)
A demanding challenge for the Maritime industry”, Look-Out-2016 Maritime Domain Cyber: Risks, Threats & Future Perspectives, Lampe& Schwartze KG, Bremen
(2014)
Securing your control systems: overcoming vulnerabilities
C. Zobel (2011)
Representing perceived tradeoffs in defining disaster resilienceDecis. Support Syst., 50
(2016)
Maritime industry slowly embracing potential of IoT
(2014)
Reducing cyber risk: marine transportation system cybersecurity standards
Felix Wortmann, Kristina Flüchter (2015)
Internet of ThingsBusiness & Information Systems Engineering, 57
(2015)
Cyber risks a threats: a demanding challenge for the Maritime industry”, Look-Out-2016 Maritime Domain Cyber: Risks, Threats&Future Perspectives, Lampe&Schwartze KG, Bremen
(2014)
Department of homeland security efforts: Implementing cybersecurity initiatives throughout the federal government
E. Wallischeck (2013)
ICS Security in Maritime Transportation: A White Paper Examining the Security and Resiliency of Critical Transportation Infrastructure
L. Atzori, A. Iera, G. Morabito (2010)
The Internet of Things: A surveyComput. Networks, 54
(2014)
Maritime governance: designed with security in mind
Gregory Wilshusen (2015)
Maritime Critical Infrastructure Protection: DHS Needs to Enhance Efforts to Address Port Cybersecurity
J. Burton (2016)
Cyber attacks and maritime situational awareness evidence from Japan and Taiwan2016 International Conference On Cyber Situational Awareness, Data Analytics And Assessment (CyberSA)
(2015)
Port adaptation to the impacts posed by climate change: how can scholars, policymakers and industrial professionals contribute?
M. Eeten, H. Bruijn, M. Kars, H. Voort, J. Till (2006)
The governance of cybersecurity: a framework for policyInt. J. Crit. Infrastructures, 2
E. Heymann, B. Miller, Mohammed Alghazzawi, David Incertis (2016)
Addressing the Cyber-Security of Maritime Shipping
H. Boyes (2015)
Cybersecurity and Cyber-Resilient Supply ChainsTechnology Innovation Management Review, 5
(2012)
Pirates exploiting cybersecurity weaknesses in Maritime industry
(2014)
The threat within: Protecting against internal enemies
(2014)
Drones at sea: automated cargo ships to set sail by 2035
C. Gibson, Michael Tarrant (2010)
A 'conceptual models' approach to organisational resilience
C. Hayes (2016)
Maritime Cybersecurity: The Future of National Security
(2014)
The Coast guard and cybersecurity: a legal framework for prevention and response
A. Boin, Allan McConnell (2007)
Preparing for Critical Infrastructure Breakdowns: The Limits of Crisis Management and the Need for ResilienceIO: Theory
J. Camillus (2008)
Strategy as a Wicked ProblemHarvard Business Review, 86
N. Roberts (2000)
Wicked Problems and Network Approaches to ResolutionInternational Public Management Review, 1
(2015)
Design of maritime cyber security systems”, Look-Out-2016 Maritime Domain Cyber: Risks, Threats andFuture Perspectives, Lampe&Schwartze KG, Bremen
(2016)
Seventh framework programme theme 7: transport (including aeronautics) TTG4 e-Maritime: proposals for R&D roadmap”,Maritime Europe Strategy Action
L. Jensen (2015)
Challenges in Maritime Cyber-ResilienceTechnology Innovation Management Review, 5
(2013)
The Critical Infrastructure Gap: US port Facilities and Cyber Vulnerabilities, Center for 21st Century Security and Intelligence at Brookings,Washington, DC
Kevin Jones, K. Tam, M. Papadaki (2012)
Threats and Impacts in Maritime Cyber SecurityEngineering & Technology Reference, 1
(2014)
Building port resilience: how cyber attacks can affect critical infrastructure
Nineta Polemi, Spyros Papastergiou (2015)
Current efforts in ports and supply chains risk assessment2015 10th International Conference for Internet Technology and Secured Transactions (ICITST)
손남선, 김선영 (2012)
e-Navigation underway 2012, 49
PurposeThe maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security vulnerabilities for the maritime industry in cyberspace. Any obstruction in the global supply chain due to a cyberattack can cause catastrophic problems in the global economy. This paper aims to review automatic identification systems (AISs) aboard ships for cyber issues and weaknesses.Design/methodology/approachThe authors do so by comparing the results of two receiver systems of the AIS in the Port of Houston; the JAMSS system aboard the Space Station and the “Harborlights” system for traffic control in the Port.FindingsThe authors find that inconsistent information is presented on the location of same ships at the same time in the Port. Upon further investigation with pilots, the authors find that these inconsistencies may be the result of the strength of power with which an AIS is transmitted. It appears the power may be reduced to the AIS in port but that it varies within port and varies by pilot operators. This practice may open the AIS system for tampering.Originality/valueFurther, this inconsistency may require further policy regulation to properly address cyber information in a port.
Maritime Business Review – Emerald Publishing
Published: Nov 19, 2018
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.