Show simple item record

dc.contributor.authorTam, K
dc.contributor.authorJones, Kevin
dc.date.accessioned2018-08-31T10:10:57Z
dc.date.issued2018-10-03
dc.identifier.issn2373-8871
dc.identifier.issn2373-8898
dc.identifier.urihttp://hdl.handle.net/10026.1/12212
dc.description.abstract

As the global maritime industry becomes increasingly dependent on advancing technology, it is important for the world to be more aware of, and understand, the possible scope and impacts cyberattacks can have on international shipping. This article explores the maritime-cyber landscape for security flaws related to the area of maritime operations with an emphasis on the system technology involved, how their vulnerabilities enable attacks with cyber elements, and possible outcomes. As ships become more sophisticated and connected, in order to meet the demands of shipping 90 per cent of the world’s goods, the cyber risks increase. This article aims to analyse compressively the unique nature of maritime cyber and cyber-physical threats to influence maritime cyber policies and improve global fleet security by suggesting adjustments and additions to current codes and policy to cover more comprehensively cyber and cyber-physical risks.

dc.format.extent147-164
dc.languageen
dc.language.isoen
dc.publisherInforma UK Limited
dc.subjectMaritime
dc.subjectpolicy
dc.subjectcybersecurity
dc.titleMaritime cybersecurity policy: the scope and impact of evolving technology on international shipping
dc.typejournal-article
plymouth.issue2
plymouth.volume3
plymouth.publication-statusPublished
plymouth.journalJournal of Cyber Policy
dc.identifier.doi10.1080/23738871.2018.1513053
plymouth.organisational-group/Plymouth
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics
plymouth.organisational-group/Plymouth/Faculty of Science and Engineering/School of Engineering, Computing and Mathematics/SoECM - Manual
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA
plymouth.organisational-group/Plymouth/REF 2021 Researchers by UoA/UoA11 Computer Science and Informatics
plymouth.organisational-group/Plymouth/Users by role
plymouth.organisational-group/Plymouth/Users by role/Academics
dcterms.dateAccepted2018-08-03
dc.rights.embargodate2020-2-28
dc.identifier.eissn2373-8898
dc.rights.embargoperiodNot known
rioxxterms.versionofrecord10.1080/23738871.2018.1513053
rioxxterms.licenseref.urihttp://www.rioxx.net/licenses/all-rights-reserved
rioxxterms.licenseref.startdate2018-10-03
rioxxterms.typeJournal Article/Review


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record


All items in PEARL are protected by copyright law.
Author manuscripts deposited to comply with open access mandates are made available in accordance with publisher policies. Please cite only the published version using the details provided on the item record or document. In the absence of an open licence (e.g. Creative Commons), permissions for further reuse of content should be sought from the publisher or author.
Theme by 
Atmire NV