{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T18:36:46Z","timestamp":1761763006097,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319203751"},{"type":"electronic","value":"9783319203768"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-20376-8_20","type":"book-chapter","created":{"date-parts":[[2015,7,20]],"date-time":"2015-07-20T06:00:17Z","timestamp":1437372017000},"page":"219-230","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["CYSM: An Innovative Physical\/Cyber Security Management System for Ports"],"prefix":"10.1007","author":[{"given":"Spyridon","family":"Papastergiou","sequence":"first","affiliation":[]},{"given":"Nineta","family":"Polemi","sequence":"additional","affiliation":[]},{"given":"Athanasios","family":"Karantjias","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,21]]},"reference":[{"key":"20_CR1","unstructured":"International Maritime Organisation: International Ship and Port Facility Security Code, London, UK (2004)"},{"key":"20_CR2","unstructured":"International Standardization Organization: Ships and marine technology \u2013 Maritime port facility security assessments and security plan development, Geneva, Switzerland (2007)"},{"key":"20_CR3","unstructured":"International Standardization Organization: ISO 27001: Information Security Management System Requirements, Geneva, Switzerland (2013)"},{"key":"20_CR4","unstructured":"International Standardization Organization: ISO 27005: Information security risk management, Geneva, Switzerland (2011)"},{"key":"20_CR5","unstructured":"International Standardization Organization: ISO 28000: Specification for security management systems for the supply chain, Geneva, Switzerland (2007)"},{"key":"20_CR6","unstructured":"International Standardization Organization: ISO 28001: Security management systems for the supply chain \u2013 Best practices for implementing supply chain security, assessments and plans \u2013 Requirements and guidance, Geneva, Switzerland (2007)"},{"key":"20_CR7","series-title":"Communications in Computer and Information Science","doi-asserted-by":"crossref","first-page":"24","DOI":"10.1007\/978-3-319-11710-2_3","volume-title":"E-Democracy, Security, Privacy and Trust in a Digital World","author":"G Makrodimitris","year":"2014","unstructured":"Makrodimitris, G., Polemi, N., Douligeris, C.: Security risk assessment challenges in port information technology systems. In: Sideridis, A.B., Yialouris, C.P., Kardasiadou, Z., Zorkadis, V. (eds.) E-Democracy 2013. CCIS, vol. 441, pp. 24\u201336. Springer, Heidelberg (2014)"},{"key":"20_CR8","series-title":"IISA 2014","first-page":"292","volume-title":"SSMDE: Secure and Sustainable Maritime Digital Environment","author":"S Papastergiou","year":"2014","unstructured":"Papastergiou, S., Polemi, N.: Harmonizing commercial port security practices & procedures in mediterranean basin. SSMDE: Secure and Sustainable Maritime Digital Environment. IISA 2014, pp. 292\u2013297. Springer, Heidelberg (2014)"},{"key":"20_CR9","series-title":"43(1)","first-page":"136","volume-title":"IISA 2014","author":"A Karantjias","year":"2014","unstructured":"Karantjias, A., Polemi, N., Papastergiou, S.: Advanced security management system for critical infrastructures. IISA 2014. 43(1), pp. 136\u2013158. Springer, Heidelberg (2014)"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Polemi, D., Ntouskas, T., Georgakakis, E., Douligeris, C., Theoharidou, M., Gritzalis, D.: S-Port: collaborative security management of port information systems. In: Proceedings of the 4th International Conference on Information, Intelligence, Systems and Applications (IISA-2013). IEEE Press, Greece, July 2013","DOI":"10.1109\/IISA.2013.6623698"},{"key":"20_CR11","unstructured":"ENISA report: Cyber security aspects in the maritime sector. ENISA (2011). \n                      http:\/\/www.enisa.europa.eu\/activities\/Resilience-and-CIIP\/critical-infrastructure-and-services\/dependencies-of-maritime-transport-to-icts"},{"key":"20_CR12","unstructured":"CYSM European Commission: Programme prevention, preparedness and consequence management of terrorism. CIPS (2012). \n                      http:\/\/www.cysm.eu\/index.php\/en\/"},{"key":"20_CR13","unstructured":"MEDUSA: Multi-order dependency approaches for managing cascading effects in ports\u2019 global supply chain and their integration in risk assesment frameworks. European Commission, Programme Prevention, Preparedness and Consequence Management of Terrorism, CIPS (2014). \n                      http:\/\/athina.cs.unipi.gr\/medusa\/"},{"key":"20_CR14","unstructured":"International Standardization Organization: ISO 31000: Risk Management \u2013 Principles and Guidelines, Geneva, Switzerland (2009)"},{"key":"20_CR15","unstructured":"International Standardization Organization: ISO 31010: Risk management \u2013 Risk assessment techniques, Geneva, Switzerland (2009)"},{"key":"20_CR16","volume-title":"ONR 49000: Risikomanagement f\u00fcr Organisationen und Systeme: Begriffe und Grundlagen","author":"Austrian Standards Institute","year":"2004","unstructured":"Austrian Standards Institute: ONR 49000: Risikomanagement f\u00fcr Organisationen und Systeme: Begriffe und Grundlagen. Wien, \u00d6sterreich (2004)"},{"key":"20_CR17","volume-title":"ISO 20000: information technology service management","author":"International Standardization Organization","year":"2005","unstructured":"International Standardization Organization: ISO 20000: information technology service management. Geneva, Switzerland (2005)"},{"key":"20_CR18","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik. IT-Grundschutz Kataloge (2013). \n                      https:\/\/www.bsi.bund.de\/DE\/Themen\/ITGrundschutz\/itgrundschutz_node.html"},{"key":"20_CR19","unstructured":"The Stationery Office (TSO): Continual service improvement. ITIL V3 (2007)"},{"key":"20_CR20","unstructured":"Common Criteria Working Group: Common methodology for information technology security evaluation - evaluation methodology. CCMB-2007-09-004 (2007). \n                      http:\/\/www.commoncriteriaportal.org"},{"issue":"6","key":"20_CR21","first-page":"6","volume":"L 129","author":"Commission European","year":"2004","unstructured":"European, Commission: Regulation (EC) No 725\/2004 of the European parliament and of the council of 31 March 2004 on enhancing ship and port facility security. Off. J. Eur. Union L 129(6), 6\u201391 (2004)","journal-title":"Off. J. Eur. Union"},{"key":"20_CR22","volume-title":"Managing Information Security Risks: The Octave Approach","author":"CJ Alberts","year":"2002","unstructured":"Alberts, C.J., Dorofee, A.: Managing Information Security Risks: The Octave Approach. Addison-Wesley Longman Publishing Co., Inc., Boston (2002)"},{"key":"20_CR23","unstructured":"Alberts, C., Dorofee, A.: Operationally critical threat, asset, and vulnerability evaluation (Octave) method implementation guide, v2.0. Software Engineering Institute, Carnegie Mellon University (2001). \n                      http:\/\/www.cert.org\/octave\/"},{"key":"20_CR24","unstructured":"Expression of needs and identification of security objectives PREMIER MINISTRE Secr\u00e9tariat g\u00e9n\u00e9ral de la d\u00e9fense nationale Direction centrale de la s\u00e9curit\u00e9 des syst\u00e8mes d\u2019information Sous-direction des op\u00e9rations Bureau conseil. \n                      www.ssi.gouv.fr"},{"key":"20_CR25","unstructured":"Clusif Methods Commission: MEHARI V3 risk analysis guide (2004)"},{"key":"20_CR26","unstructured":"EU Project Nr. IST-2000-25031: CORAS - risk assessment of security critical systems (2003). \n                      http:\/\/www2.nr.no\/coras\/"},{"key":"20_CR27","doi-asserted-by":"crossref","unstructured":"Stoneburner, G., Goguen, A., Feringa, A.: Special publication 800-30: risk management guide for information technology systems. Technical report, National Institute of Standards and Technology, Gaithersburg (2002)","DOI":"10.6028\/NIST.SP.800-30"},{"key":"20_CR28","unstructured":"Information Security Assessment & Monitoring Method (ISAMM). \n                      http:\/\/www.telindus.com"},{"key":"20_CR29","unstructured":"Insight Consulting: CRAMM User Guide, Issue 5.1, United Kingdom (2005)"},{"issue":"2","key":"20_CR30","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1504\/IJMCDM.2012.046941","volume":"2","author":"T Ntouskas","year":"2012","unstructured":"Ntouskas, T., Polemi, N.: STORM-RM: collaborative and multicriteria risk management methodology. Int. J. Multicriteria Decis. Mak. 2(2), 159\u2013177 (2012)","journal-title":"Int. J. Multicriteria Decis. Mak."},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Ntouskas, T., Polemi, N.: Collaborative security management services for port information systems. DCNET\/ICE-B\/OPTICS, pp. 305\u2013308 (2012)","DOI":"10.1109\/IISA.2013.6623698"},{"issue":"15","key":"20_CR32","doi-asserted-by":"publisher","first-page":"1278","DOI":"10.1016\/j.oceaneng.2009.07.003","volume":"36","author":"J-F Balmat","year":"2009","unstructured":"Balmat, J.-F., Lafont, F., Maifret, R., Pessel, N.: MAritime RISk Assessment (MARISA), a fuzzy approach to define an individual ship risk factor. Ocean Eng. 36(15), 1278\u20131286 (2009). doi:\n                      10.1016\/j.oceaneng.2009.07.003","journal-title":"Ocean Eng."},{"key":"20_CR33","unstructured":"SAFESEANET, a European platform for maritime data exchange between member states\u2019 maritime authorities, is a network\/internet solution based on the concept of a distributed database. \n                      http:\/\/ec.europa.eu\/idabc\/en\/document\/2282\/5926.html"}],"container-title":["Lecture Notes in Computer Science","Human Aspects of Information Security, Privacy, and Trust"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-20376-8_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T15:17:28Z","timestamp":1583507848000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-20376-8_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319203751","9783319203768"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-20376-8_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"21 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}