{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T13:01:02Z","timestamp":1725886862632},"reference-count":28,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,7,1]],"date-time":"2022-07-01T00:00:00Z","timestamp":1656633600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Critical Infrastructure Protection"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1016\/j.ijcip.2022.100526","type":"journal-article","created":{"date-parts":[[2022,3,27]],"date-time":"2022-03-27T21:57:16Z","timestamp":1648418236000},"page":"100526","update-policy":"http:\/\/dx.doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":29,"special_numbering":"C","title":["Digital transformation of the maritime industry: A cybersecurity systemic approach"],"prefix":"10.1016","volume":"37","author":[{"ORCID":"http:\/\/orcid.org\/0000-0001-9466-6185","authenticated-orcid":false,"given":"Evripidis P.","family":"Kechagias","sequence":"first","affiliation":[]},{"given":"Georgios","family":"Chatzistelios","sequence":"additional","affiliation":[]},{"given":"Georgios A.","family":"Papadopoulos","sequence":"additional","affiliation":[]},{"given":"Panagiotis","family":"Apostolou","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.ijcip.2022.100526_bib0001","unstructured":"ICS, Shipping and World Trade: Driving Prosperity, International Chamber of Shipping. (2021). https:\/\/www.ics-shipping.org\/shipping-fact\/shipping-and-world-trade-driving-prosperity\/(accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0002","unstructured":"UNCTAD, Review of Maritime Transport 2020, United Nations Conference on Trade and Development. (2020). https:\/\/unctad.org\/webflyer\/review-maritime-transport-2020 (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0003","unstructured":"Allianz, Safety and Shipping Review, Munich, Germany, 2020. https:\/\/www.agcs.allianz.com\/content\/dam\/onemarketing\/agcs\/agcs\/reports\/AGCS-Safety-Shipping-Review-2020.pdf (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0004","unstructured":"BIMCO, The Guidelines on Cyber Security Onboard Ships, Bagsv\u00e6rd, Denmark, 2020. https:\/\/www.bimco.org\/about-us-and-our-members\/publications\/the-guidelines-on-cyber-security-onboard-ships (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0005","unstructured":"D. Cimpean, J. Meire, V. Bouckaert, S. vande Casteele, A. Pelle, L. Hellebooge, Cyber Security Aspects in the Maritime Sector, Hraklion, Greece, 2011. https:\/\/www.enisa.europa.eu\/publications\/cyber-security-aspects-in-the-maritime-sector-1 (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0006","doi-asserted-by":"crossref","DOI":"10.1016\/j.trpro.2020.03.058","article-title":"Critical infrastructures cybersecurity and the maritime sector","volume":"45","author":"Alcaide","year":"2020","journal-title":"Transp. Res. Procedia"},{"key":"10.1016\/j.ijcip.2022.100526_bib0007","doi-asserted-by":"crossref","first-page":"1","DOI":"10.3390\/jmse8100776","article-title":"Assessing cyber challenges of maritime navigation","volume":"8","author":"Androjna","year":"2020","journal-title":"J. Mar. Sci. Eng."},{"key":"10.1016\/j.ijcip.2022.100526_bib0008","doi-asserted-by":"crossref","unstructured":"L. Ayala, Cybersecurity Lexicon, 1st ed., Apress, New York, USA, 2016.","DOI":"10.1007\/978-1-4842-2068-9_1"},{"key":"10.1016\/j.ijcip.2022.100526_bib0009","unstructured":"Futurenautics, Crew Connectivity Survey Report 2015, Futurenautics Ltd. (2015). https:\/\/www.futurenautics.com\/product\/2015-crew-connectivity-survey-report\/(accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0010","unstructured":"Futurenautics, Crew Connectivity Survey Report 2018, Futurenautics Ltd. (2018). http:\/\/www.navarino.co.uk\/wp-content\/uploads\/2018\/04\/Crew_Connectivity_2018_Survey_Report.pdf (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0011","unstructured":"IMO, Maritime Cyber Risk, International Maritime Organization. (2019). https:\/\/www.imo.org\/en\/OurWork\/Security\/Pages\/Cyber-security.aspx (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0012","unstructured":"MARSH, Global Marine Practice The Risk of Cyber-Attack To the Maritime Sector, Marsh & McLennan Companies. (2014). https:\/\/www.ahcusa.org\/uploads\/2\/1\/9\/8\/21985670\/the_risk_of_cyber-attack_to_the_maritime_sector-07-2014.pdf (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0013","doi-asserted-by":"crossref","unstructured":"K. Tam, K.D. Jones, M. Papadaki, Threats and Impacts in Maritime Cyber Security, Engineering & Technology Reference. 1 (2012). 10.1049\/etr.2015.0123.","DOI":"10.1049\/etr.2015.0123"},{"key":"10.1016\/j.ijcip.2022.100526_bib0014","unstructured":"WEF, The Global Risks Report 2021, Geneva, Switzerland, 2021. https:\/\/www.weforum.org\/reports\/the-global-risks-report-2021 (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0015","unstructured":"Allianz, Allianz Risk Barometer Identifying Hte Major Business Risks for 2021, Munich, Germany, 2021. https:\/\/www.assiteca.it\/wp-content\/uploads\/2021\/01\/Allianz-Risk-Barometer-2021.pdf (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0016","unstructured":"J. Daffron, Shen Attack Cyber Risk Scenario: up to $110 billion at risk from maritime malware attack, Cambridge Centre for Risk Studies. (2019). https:\/\/risk-studies-viewpoint.blog.jbs.cam.ac.uk\/2019\/10\/30\/shen-attack-cyber-risk-scenario-up-to-110-billion-at-risk-from-maritime-malware-attack\/(accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0017","unstructured":"J.-E. Vinnem, I.B. Utne, Safe Societies in a Changing World\u00a0: Proceedings of ESREL 2018, June 17-21, 2018, Trondheim, Norway., Taylor & Francis Group, London UK, 2018. https:\/\/ntnuopen.ntnu.no\/ntnu-xmlui\/bitstream\/handle\/11250\/2586644\/10.1201_9781351174664-188.pdf?sequence=2&isAllowed=y (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0018","unstructured":"C. Cimpanu, All four of the world's largest shipping companies have now been hit by cyber-attacks, ZDNet. (2020). https:\/\/www.zdnet.com\/article\/all-four-of-the-worlds-largest-shipping-companies-have-now-been-hit-by-cyber-attacks\/(accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0019","unstructured":"A. Sheperd, What is NotPetya?, ITPro. (2021). https:\/\/www.itpro.co.uk\/malware\/34381\/what-is-notpetya (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0020","unstructured":"C. Pownall, The Context and Impact of Maerk's NotPetya cyber attack, London, UK, 2019. https:\/\/charliepownall.com\/maersk-notpetya-cyberattack-timeline\/(accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0021","doi-asserted-by":"crossref","unstructured":"P. Kapalidis, Cybersecurity at Sea, in: 2020. 10.1007\/978-3-030-34630-0_8.","DOI":"10.1007\/978-3-030-34630-0_8"},{"key":"10.1016\/j.ijcip.2022.100526_bib0022","unstructured":"IMO, Guidelines on Cyber Risk Mangement, London, UK, 2017. https:\/\/wwwcdn.imo.org\/localresources\/en\/OurWork\/Security\/Documents\/MSC-FAL.1-Circ.3%20-%20Guidelines%20On%20Maritime%20Cyber%20Risk%20Management%20(Secretariat).pdf. (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0023","series-title":"Proceedings of the Annual ISA Analysis Division Symposium","article-title":"Framework for improving critical infrastructure cybersecurity","author":"Barrett","year":"2018"},{"key":"10.1016\/j.ijcip.2022.100526_bib0024","unstructured":"IPA, Cybersecurity Management Guidelines Ver 1.1., Tokyo, Japan, 2016. https:\/\/www.yumpu.com\/en\/document\/view\/56523440\/cybersecurity-management-guidelines-ver-11 (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0025","unstructured":"DNV, Cyber security resilience management for ships and mobile offshore units in operation, H\u00f8vik, Norway, 2016. https:\/\/www.gard.no\/Content\/21865536\/DNVGL-RP-0496.pdf (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0026","unstructured":"ABS, Guidance notes on Risk Assessment Applications for the Marine and Offshore Industries, Spring, USA, 2020. Guidance notes on Risk Assessment Applications for the Marine and Offshore Industries (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0027","unstructured":"INSB, International Naval Surveys Bureau Class, INSB Class. (2010). https:\/\/insb.gr (accessed September 15, 2021)."},{"key":"10.1016\/j.ijcip.2022.100526_bib0028","unstructured":"Trend Micro, Spear-phishing email\u00a0: most favored APT attack bait, Trend Micro Incorporated. (2012). https:\/\/documents.trendmicro.com\/assets\/wp\/wp-spear-phishing-email-most-favored-apt-attack-bait.pdf (accessed September 15, 2021)."}],"container-title":["International Journal of Critical Infrastructure Protection"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874548222000166?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S1874548222000166?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T21:55:09Z","timestamp":1717019709000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S1874548222000166"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7]]},"references-count":28,"alternative-id":["S1874548222000166"],"URL":"https:\/\/doi.org\/10.1016\/j.ijcip.2022.100526","relation":{},"ISSN":["1874-5482"],"issn-type":[{"value":"1874-5482","type":"print"}],"subject":[],"published":{"date-parts":[[2022,7]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Digital transformation of the maritime industry: A cybersecurity systemic approach","name":"articletitle","label":"Article Title"},{"value":"International Journal of Critical Infrastructure Protection","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.ijcip.2022.100526","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2022 Elsevier B.V. All rights reserved.","name":"copyright","label":"Copyright"}],"article-number":"100526"}}