{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,27]],"date-time":"2025-11-27T21:01:24Z","timestamp":1764277284681,"version":"3.37.3"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/501100005416","name":"Norges Forskningsr\u00e5d","doi-asserted-by":"publisher","award":["295077"],"award-info":[{"award-number":["295077"]}],"id":[{"id":"10.13039\/501100005416","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int. J. Inf. Secur."],"published-print":{"date-parts":[[2024,10]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>In recent years, vessels have become increasingly digitized, reflecting broader societal trends. As a result, maritime operations have become an attractive target for cyber threat actors. Despite the limited cybersecurity training seafarers receive, they are expected to operate within technologically advanced environments. The importance of cybersecurity awareness is evident, but the extent of seafarers\u2019 knowledge in this area remains uncertain. This article investigates three primary aspects: (1) the current state of cybersecurity onboard cargo vessels, (2) seafarers\u2019 cybersecurity awareness, and (3) potential improvements in seafarers\u2019 cybersecurity awareness. To accomplish this, a literature review is conducted to collect and analyze current research, supplemented by a questionnaire survey targeting Turkish seafarers. Our findings support increased investment in awareness and training programs, including organizational-wide cybersecurity awareness efforts, more frequent training, mandatory training for all seafarers through the Standards of Training Certification and Watchkeeping (STCW), and the appointment of a cybersecurity Officer (CySO) to ensure satisfactory cybersecurity levels onboard. Since this article focuses on high-level topics by assessing the general state of maritime cybersecurity and seafarers\u2019 cybersecurity awareness, it does not delve into detailed considerations of awareness and training programs. Nevertheless, it lays the foundation for future research in this area.<\/jats:p>","DOI":"10.1007\/s10207-024-00884-2","type":"journal-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T18:02:10Z","timestamp":1720634530000},"page":"3153-3178","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Survey-based analysis of cybersecurity awareness of Turkish seafarers"],"prefix":"10.1007","volume":"23","author":[{"given":"Ivar","family":"Moen","sequence":"first","affiliation":[]},{"given":"Aybars","family":"Oruc","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"Amro","sequence":"additional","affiliation":[]},{"given":"Vasileios","family":"Gkioulos","sequence":"additional","affiliation":[]},{"given":"Georgios","family":"Kavallieratos","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,7,10]]},"reference":[{"key":"884_CR1","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1016\/j.trpro.2020.03.058","volume":"45","author":"JI Alcaide","year":"2020","unstructured":"Alcaide, J.I., Llave, R.G.: Critical infrastructures cybersecurity and the maritime sector. Transp. Res. Procedia 45, 547\u2013554 (2020). https:\/\/doi.org\/10.1016\/j.trpro.2020.03.058","journal-title":"Transp. Res. Procedia"},{"issue":"2","key":"884_CR2","doi-asserted-by":"publisher","first-page":"248","DOI":"10.31217\/p.35.2.7","volume":"35","author":"NARA Ali","year":"2021","unstructured":"Ali, N.A.R.A., Chebotareva, A.A., Chebotarev, V.E.: Cyber security in marine transport: opportunities and legal challenges. Pomorstvo 35(2), 248\u2013255 (2021). https:\/\/doi.org\/10.31217\/p.35.2.7","journal-title":"Pomorstvo"},{"unstructured":"Asariotis, R., et al.: Review of Maritime Transport 2020 (2020). https:\/\/unctad.org\/webflyer\/review-maritime-transport-2020","key":"884_CR3"},{"unstructured":"Asariotis, R., et al.: Review of Maritime Transport 2021 (2021). https:\/\/unctad.org\/webflyer\/review-maritime-transport-2021","key":"884_CR4"},{"doi-asserted-by":"publisher","unstructured":"Avanesova, T.P., et al.: Analysis of cyber-security aspects both ashore and at sea. In: IOP Conference Series: Earth and Environmental Science, vol. 872(1), p. 012024 (2021). https:\/\/doi.org\/10.1088\/1755-1315\/872\/1\/012024","key":"884_CR5","DOI":"10.1088\/1755-1315\/872\/1\/012024"},{"issue":"1","key":"884_CR6","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1002\/navi.183","volume":"64","author":"J Bhatti","year":"2017","unstructured":"Bhatti, J., Humphreys, T.E.: Covert control of surface vessels via counterfeit civil GPS signals. Navigat. J. Inst. Navigat. 64(1), 51\u201366 (2017). https:\/\/doi.org\/10.1002\/navi.183","journal-title":"Navigat. J. Inst. Navigat."},{"key":"884_CR7","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s11999-009-1164-4","volume":"468","author":"DJ Biau","year":"2010","unstructured":"Biau, D.J., Jolles, B.M., Porcher, R.: P Value and the theory of hypothesis testing: an explanation for new researchers. Clin. Orthop. Relat. Res. 468, 885\u2013892 (2010). https:\/\/doi.org\/10.1007\/s11999-009-1164-4","journal-title":"Clin. Orthop. Relat. Res."},{"unstructured":"BIMCO. Cyber Security Workbook for On Board Ship Use, 3rd edn. Witherby Seamanship International (2021). ISBN: 9781914992094","key":"884_CR8"},{"unstructured":"BIMCO. The Guidelines on Cyber Security Onboard Ships, version 4. Tech. rep. (2020). https:\/\/www.bimco.org\/-\/media\/bimco\/about-us-and-our-members\/publications\/ebooks\/guidelines-on-cyber-security-onboard-ships-v4.ashx","key":"884_CR9"},{"key":"884_CR10","doi-asserted-by":"publisher","first-page":"344","DOI":"10.5505\/jems.2019.85057","volume":"7","author":"P Bolat","year":"2019","unstructured":"Bolat, P., Kayi\u015fo\u011flu, G.: Antecedents and consequences of cybersecurity awareness: a case study for Turkish maritime sector. J. ETA Mar. Sci. 7, 344\u2013360 (2019). https:\/\/doi.org\/10.5505\/jems.2019.85057","journal-title":"J. ETA Mar. Sci."},{"unstructured":"Boyes, H., Isbell, R.: Code of practice: cyber security for ships. Institution of Engineering and Technology (2017). ISBN: 9781785615771","key":"884_CR11"},{"unstructured":"Burgess, T.F.: A general introduction to the design of questionnaires for survey research (2001)","key":"884_CR12"},{"unstructured":"Center for cybersikkerhed. Cybertruslen mod hj\u0153lpemidler til navigation [Cyber threat against navigational aids]. Tech. rep. Center for cybersikkerhed (Centre for Cyber Security) (2022). https:\/\/www.cfcs.dk\/globalassets\/cfcs\/dokumenter\/trusselsvurderinger\/cybertruslen-mod-hjalpemidler-til-navigation.pdf","key":"884_CR13"},{"key":"884_CR14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-43999-6","volume-title":"Building a Cybersecurity Culture in Organizations\u2014How to Bridge the Gap Between People and Digital Technology","author":"I Corradini","year":"2020","unstructured":"Corradini, I.: Building a Cybersecurity Culture in Organizations\u2014How to Bridge the Gap Between People and Digital Technology. Springer, Berlin (2020). https:\/\/doi.org\/10.1007\/978-3-030-43999-6"},{"doi-asserted-by":"publisher","unstructured":"Croteau, B.: Lessons learned from teaching a maritime industrial control systems cybersecurity course. In: 2023 IEEE 48th Conference on Local Computer Networks (LCN), pp. 48\u201355 (2023). https:\/\/doi.org\/10.1109\/LCN58197.2023.10223335","key":"884_CR15","DOI":"10.1109\/LCN58197.2023.10223335"},{"unstructured":"Da Veiga, A., Martin, N.: Information security culture: a comparative analysis of four assessments. In: Devos, J., de Haas, S. (eds.) 8th European Conference on IS Management and Evaluation (ECIME 2014) (2014)","key":"884_CR16"},{"key":"884_CR17","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1108\/ICS-08-2017-0056","volume":"26","author":"A Da Veiga","year":"2018","unstructured":"Da Veiga, A.: An approach to information security culture change combining ADKAR and the ISCA questionnaire to aid transition to the desired culture. Inf. Comput. Secur. 26, 584\u2013612 (2018). https:\/\/doi.org\/10.1108\/ICS-08-2017-0056","journal-title":"Inf. Comput. Secur."},{"unstructured":"EduMaritime. Cyber Security Awareness for Seafarers Training & Certification Online - VIRSEC. https:\/\/www.edumaritime.net\/virsec\/cyber-security-awareness-for-seafarers","key":"884_CR18"},{"key":"884_CR19","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1007\/s13437-023-00304-7","volume":"22","author":"E Erstad","year":"2023","unstructured":"Erstad, E., et al.: A human-centred design approach for the development and conducting of maritime cyber resilience training. WMU J. Marit. Aff. 22, 241\u2013266 (2023). https:\/\/doi.org\/10.1007\/s13437-023-00304-7","journal-title":"WMU J. Marit. Aff."},{"key":"884_CR20","doi-asserted-by":"publisher","first-page":"27","DOI":"10.12716\/1001.15.01.01","volume":"15","author":"E Erstad","year":"2021","unstructured":"Erstad, E., Ostnes, R., Lund, M.S.: An operational approach to maritime cyber resilience. TransNav 15, 27\u201334 (2021). https:\/\/doi.org\/10.12716\/1001.15.01.01","journal-title":"TransNav"},{"key":"884_CR21","doi-asserted-by":"publisher","DOI":"10.3390\/info13010022","author":"MAB Farah","year":"2022","unstructured":"Farah, M.A.B., et al.: Cyber security in the maritime industry: a systematic survey of recent advances and future trends. Information (Switzerland) (2022). https:\/\/doi.org\/10.3390\/info13010022","journal-title":"Information (Switzerland)"},{"key":"884_CR22","doi-asserted-by":"publisher","DOI":"10.1080\/23311975.2017.1411066","author":"M Fruth","year":"2017","unstructured":"Fruth, M., Teuteberg, F.: Digitization in maritime logistics\u2013What is there and what is missing? Cogent Bus. Manag. (2017). https:\/\/doi.org\/10.1080\/23311975.2017.1411066","journal-title":"Cogent Bus. Manag."},{"key":"884_CR23","doi-asserted-by":"publisher","first-page":"267","DOI":"10.4028\/www.scientific.net\/AEF.34.267","volume":"34","author":"R Hanzu-Pazara","year":"2019","unstructured":"Hanzu-Pazara, R., Raicu, G., Zagan, R.: The impact of human behaviour on cyber security of the maritime systems. Adv. Eng. Forum 34, 267\u2013274 (2019)","journal-title":"Adv. Eng. Forum"},{"key":"884_CR24","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1201\/9781003216582-06","volume-title":"Developments in Maritime Technology and Engineering","author":"D Heering","year":"2021","unstructured":"Heering, D., Maennel, O.M., Venables, A.N.: Shortcomings in cybersecurity education for seafarers. In: Guedes Soares, C., Santos, T.A. (eds.) Developments in Maritime Technology and Engineering, pp. 49\u201361. CRC Press, London (2021). https:\/\/doi.org\/10.1201\/9781003216582-06"},{"key":"884_CR25","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1109\/MCOMSTD.101.2000073","volume":"5","author":"R Hopcraft","year":"2021","unstructured":"Hopcraft, R.: Developing maritime digital competencies. IEEE Commun. Stand. Mag. 5, 12\u201318 (2021). https:\/\/doi.org\/10.1109\/MCOMSTD.101.2000073","journal-title":"IEEE Commun. Stand. Mag."},{"key":"884_CR26","doi-asserted-by":"publisher","first-page":"354","DOI":"10.1080\/19480881.2018.1519056","volume":"14","author":"R Hopcraft","year":"2018","unstructured":"Hopcraft, R., Martin, K.M.: Effective maritime cybersecurity regulation\u2014the case for a cyber code. J. Indian Ocean Region 14, 354\u2013366 (2018). https:\/\/doi.org\/10.1080\/19480881.2018.1519056","journal-title":"J. Indian Ocean Region"},{"unstructured":"IMO. Member states. https:\/\/www.imo.org\/en\/OurWork\/ERO\/Pages\/MemberStates.aspx (visited on 01\/05\/2024)","key":"884_CR27"},{"unstructured":"IMO. Resolution MSC.428(98) Maritime cyber risk management in Safety Management Systems. London (2017)","key":"884_CR28"},{"unstructured":"International Chamber of Shipping and BIMCO. Seafarer Workforce Report, 2021 Edition. (July 2021). https:\/\/www.ics-shipping.org\/publication\/seafarer-workforce-report-2021-edition\/","key":"884_CR29"},{"unstructured":"International Maritime Organization (IMO). Guidelines On Maritime Cyber Risk Management - MSC-FAL.1-Circ.3. (2017). https:\/\/www.imo.org\/en\/OurWork\/Security\/Pages\/Cyber-security.aspx","key":"884_CR30"},{"unstructured":"International Maritime Organization (IMO). International Convention on Standards of Training, Certification and Watchkeeping (STCW), 2010 Manila Amendments (1978)","key":"884_CR31"},{"unstructured":"International Transport Workers\u2019 Federation. STCW\u2014A guide for seafarers (2014)","key":"884_CR32"},{"key":"884_CR33","doi-asserted-by":"publisher","first-page":"35","DOI":"10.22215\/timreview\/889","volume":"5","author":"L Jensen","year":"2015","unstructured":"Jensen, L.: Challenges in maritime cyber-resilience. Technol. Innov. Manag. Rev. 5, 35\u201339 (2015)","journal-title":"Technol. Innov. Manag. Rev."},{"doi-asserted-by":"publisher","unstructured":"Kanwal, K., et al.: Maritime cybersecurity: are onboard systems ready? (2022). https:\/\/doi.org\/10.1080\/03088839.2022.2124464. https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/03088839.2022.2124464","key":"884_CR34","DOI":"10.1080\/03088839.2022.2124464"},{"issue":"2","key":"884_CR35","doi-asserted-by":"publisher","first-page":"147","DOI":"10.1016\/j.cose.2004.07.004","volume":"24","author":"B Karabacak","year":"2005","unstructured":"Karabacak, B., Sogukpinar, I.: ISRAM: information security risk analysis method. Comput. Secur. 24(2), 147\u2013159 (2005)","journal-title":"Comput. Secur."},{"key":"884_CR36","doi-asserted-by":"publisher","first-page":"179","DOI":"10.1007\/s12198-020-00223-1","volume":"13","author":"H Karahalios","year":"2020","unstructured":"Karahalios, H.: Appraisal of a Ship\u2019s Cybersecurity efficiency: the case of piracy. J. Transp. Secur. 13, 179\u2013201 (2020). https:\/\/doi.org\/10.1007\/s12198-020-00223-1","journal-title":"J. Transp. Secur."},{"key":"884_CR37","doi-asserted-by":"publisher","DOI":"10.3390\/jmse9121323","author":"S Karamperidis","year":"2021","unstructured":"Karamperidis, S., Kapalidis, C., Watson, T.: Maritime cyber security: a global challenge tackled through distinct regional approaches. J. Mar. Sci. Eng. (2021). https:\/\/doi.org\/10.3390\/jmse9121323","journal-title":"J. Mar. Sci. Eng."},{"key":"884_CR38","doi-asserted-by":"publisher","first-page":"429","DOI":"10.12716\/1001.12.03.01","volume":"12","author":"GC Kessler","year":"2018","unstructured":"Kessler, G.C., Craiger, P., Haass, J.C.: A taxonomy framework for maritime cybersecurity: a demonstration using the automatic identification system. TransNav. Int. J. Mar. Navigat. Saf. Sea Transp. 12, 429\u2013437 (2018). https:\/\/doi.org\/10.12716\/1001.12.03.01","journal-title":"TransNav. Int. J. Mar. Navigat. Saf. Sea Transp."},{"key":"884_CR39","doi-asserted-by":"publisher","first-page":"193","DOI":"10.1007\/s13437-021-00235-1","volume":"20","author":"K Kuhn","year":"2021","unstructured":"Kuhn, K., Bicakci, S., Shaikh, S.A.: COVID-19 digitization in maritime: understanding cyber risks. WMU J. Marit. Aff. 20, 193\u2013214 (2021). https:\/\/doi.org\/10.1007\/s13437-021-00235-1","journal-title":"WMU J. Marit. Aff."},{"key":"884_CR40","doi-asserted-by":"publisher","DOI":"10.1016\/j.marpol.2020.104180","author":"JM Lane","year":"2020","unstructured":"Lane, J.M., Pretes, M.: Maritime dependency and economic prosperity: why access to oceanic trade matters. Mar. Policy (2020). https:\/\/doi.org\/10.1016\/j.marpol.2020.104180","journal-title":"Mar. Policy"},{"key":"884_CR41","doi-asserted-by":"publisher","first-page":"144895","DOI":"10.1109\/ACCESS.2021.3122433","volume":"9","author":"MH Larsen","year":"2021","unstructured":"Larsen, M.H., Lund, M.S.: A maritime perspective on cyber risk perception: a systematic literature review. IEEE Access 9, 144895\u2013144905 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3122433","journal-title":"IEEE Access"},{"unstructured":"Lee, S.H.: Constructing effective questionnaires. In: Pershing, J.A. (ed.) Handbook of Human Performance Technology: Principles, Practices, and Potential, 3rd edn, pp. 760\u2013779 (2006)","key":"884_CR42"},{"key":"884_CR43","doi-asserted-by":"publisher","first-page":"3195","DOI":"10.3390\/s21093195","volume":"21","author":"WC Leite Junior","year":"2021","unstructured":"Leite Junior, W.C., et al.: A triggering mechanism for cyber-attacks in naval sensors and systems. Sensors 21, 3195 (2021). https:\/\/doi.org\/10.3390\/s21093195","journal-title":"Sensors"},{"key":"884_CR44","doi-asserted-by":"publisher","first-page":"149","DOI":"10.21339\/2464-353x.3.2.149","volume":"3","author":"MS Lund","year":"2018","unstructured":"Lund, M.S., Hareide, O.S., J\u00f8sok, \u00d8.: An attack on an integrated navigation system. Necesse 3, 149\u2013163 (2018). https:\/\/doi.org\/10.21339\/2464-353x.3.2.149","journal-title":"Necesse"},{"unstructured":"Martins, N., Da Veiga, A.: The value of using a validated information security culture instrument. In: Devos, J., de Haas, S. (eds.) 8th European Conference on IS Management and Evaluation (ECIME 2014), pp. 146\u2013154 (2014). https:\/\/www.researchgate.net\/publication\/266672235_The_Value_of_Using_a_Validated_Information_Security_Culture_Instrument","key":"884_CR45"},{"key":"884_CR46","doi-asserted-by":"publisher","first-page":"44","DOI":"10.4031\/MTSJ.52.5.11","volume":"52","author":"P McGillivary","year":"2018","unstructured":"McGillivary, P.: Why maritime cybersecurity is an ocean policy priority and how it can be addressed. Mar. Technol. Soc. J. 52, 44\u201357 (2018)","journal-title":"Mar. Technol. Soc. J."},{"key":"884_CR47","doi-asserted-by":"publisher","first-page":"519","DOI":"10.12716\/1001.15.03.04","volume":"15","author":"PH Meland","year":"2021","unstructured":"Meland, P.H., et al.: A retrospective analysis of maritime cyber security incidents. TransNav 15, 519\u2013530 (2021). https:\/\/doi.org\/10.12716\/1001.15.03.04","journal-title":"TransNav"},{"key":"884_CR48","doi-asserted-by":"publisher","first-page":"132","DOI":"10.7225\/toms.v08.n01.013","volume":"8","author":"I Mrakovi\u0107","year":"2019","unstructured":"Mrakovi\u0107, I., Vojinovi\u0107, R.: Maritime cyber security analysis\u2014How to reduce threats? Trans. Mar. Sci. 8, 132\u2013139 (2019). https:\/\/doi.org\/10.7225\/toms.v08.n01.013","journal-title":"Trans. Mar. Sci."},{"key":"884_CR49","doi-asserted-by":"publisher","first-page":"206","DOI":"10.7225\/toms.v09n02.005","volume":"9","author":"I Mrakovi\u0107","year":"2020","unstructured":"Mrakovi\u0107, I., Vojinovi\u0107, R.: Evaluation of Montenegrin seafarers\u2019 awareness of cyber security. Trans. Mar. Sci. 9, 206\u2013216 (2020). https:\/\/doi.org\/10.7225\/toms.v09n02.005","journal-title":"Trans. Mar. Sci."},{"issue":"6","key":"884_CR50","doi-asserted-by":"publisher","first-page":"48","DOI":"10.53656\/ped2023-6s.05","volume":"95","author":"DB Nikolov","year":"2023","unstructured":"Nikolov, D.B.: Maritime cybersecurity education and training at Nikola Vaptsarov naval academy. Pedagogika-Pedagogy 95(6), 48\u201355 (2023). https:\/\/doi.org\/10.53656\/ped2023-6s.05","journal-title":"Pedagogika-Pedagogy"},{"unstructured":"NORMA Cyber. NORMA Cyber Annual Threat Assessment 2022. Tech. rep. (2022). https:\/\/www.normacyber.no\/news\/norma-annual-threat-assessment-2022","key":"884_CR51"},{"issue":"43","key":"884_CR52","first-page":"879","volume":"37","author":"C Okoli","year":"2015","unstructured":"Okoli, C.: A guide to conducting a standalone systematic literature review. Commun. Assoc. Inf. Syst. 37(43), 879\u2013910 (2015)","journal-title":"Commun. Assoc. Inf. Syst."},{"doi-asserted-by":"publisher","unstructured":"Oruc, A.: Tanker industry is more ready against cyber threats. In: International Conference on Marine Engineering and Technology Oman 2019 (ICMET Oman) (2019). https:\/\/doi.org\/10.24868\/icmet.oman.2019.030","key":"884_CR53","DOI":"10.24868\/icmet.oman.2019.030"},{"key":"884_CR54","doi-asserted-by":"publisher","first-page":"1477","DOI":"10.1007\/s10207-023-00799-4","volume":"23","author":"A Oruc","year":"2024","unstructured":"Oruc, A., Chowdhury, N., Gkioulos, V.: A modular cyber security training programme for the maritime domain. Int. J. Inf. Secur. 23, 1477\u20131512 (2024). https:\/\/doi.org\/10.1007\/s10207-023-00799-4","journal-title":"Int. J. Inf. Secur."},{"doi-asserted-by":"publisher","unstructured":"Pavur, J., et al.: A tale of sea and sky on the security of maritime VSAT communications. In: 2020 IEEE Symposium on Security and Privacy (SP), pp. 1384\u20131400 (2020). https:\/\/doi.org\/10.1109\/SP40000.2020.00056","key":"884_CR55","DOI":"10.1109\/SP40000.2020.00056"},{"unstructured":"Penn State\u2019s Department of Statistics. 2.3\u2014Tukey Test for Pairwise Mean Comparisons\u2014STAT 502. https:\/\/online.stat.psu.edu\/stat502_fa21\/lesson\/2\/2.3","key":"884_CR56"},{"unstructured":"Penn State\u2019s Department of Statistics. 2.4\u2014Other Pairwise Mean Comparison Methods\u2014STAT502. https:\/\/online.stat.psu.edu\/stat502_fa21\/lesson\/2\/2.4","key":"884_CR57"},{"key":"884_CR58","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72751-4","volume-title":"Maritime Work Law Fundamentals: Responsible Shipowners, Reliable Seafarers","author":"DA Pentsov","year":"2008","unstructured":"Pentsov, D.A., Christodoulou-Varotsi, I.: Maritime Work Law Fundamentals: Responsible Shipowners, Reliable Seafarers. Springer, Berlin (2008). https:\/\/doi.org\/10.1007\/978-3-540-72751-4"},{"key":"884_CR59","doi-asserted-by":"publisher","DOI":"10.3390\/jmse9121384","author":"I Progoulakis","year":"2021","unstructured":"Progoulakis, I., Rohmeyer, P., Nikitakos, N.: Cyber physical systems security for maritime assets. J. Mar. Sci. Eng. (2021). https:\/\/doi.org\/10.3390\/jmse9121384","journal-title":"J. Mar. Sci. Eng."},{"doi-asserted-by":"publisher","unstructured":"Reeg\u00e5rd, K., Blackett, C., Katta, V.: The concept of cybersecurity culture. In: Beer, M., Zio, E. (eds.) Proceedings of the 29th European Safety and Reliability Conference (ESREL), pp. 4036\u20134043 (2019). ISBN: 978-981-11-2724-3. https:\/\/doi.org\/10.3850\/978-981-11-2724-3_0761-cd","key":"884_CR60","DOI":"10.3850\/978-981-11-2724-3_0761-cd"},{"key":"884_CR61","volume-title":"Statistics for Dummies","author":"DJ Rumsey","year":"2011","unstructured":"Rumsey, D.J.: Statistics for Dummies, 2nd edn. Wiley, Hoboken (2011)","edition":"2"},{"key":"884_CR62","doi-asserted-by":"publisher","DOI":"10.3390\/s19040926","author":"PL Sanchez-Gonzalez","year":"2019","unstructured":"Sanchez-Gonzalez, P.L., et al.: Toward digitalization of maritime transport? Sensors (Switzerland) (2019). https:\/\/doi.org\/10.3390\/s19040926","journal-title":"Sensors (Switzerland)"},{"doi-asserted-by":"crossref","unstructured":"Saris, W.E., Gallhofer, I.N.: Design, evaluation, and analysis of questionnaires for survey research. In: Design, Evaluation, and Analysis of Questionnaires for Survey Research, 2nd. Wiley (2014)","key":"884_CR63","DOI":"10.1002\/9781118634646"},{"key":"884_CR64","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1016\/j.ajsl.2021.10.002","volume":"37","author":"C Senarak","year":"2021","unstructured":"Senarak, C.: Cybersecurity knowledge and skills for port facility security officers of international seaports: perspectives of IT and security personnel. Asian J. Ship. Logist. 37, 345\u2013360 (2021). https:\/\/doi.org\/10.1016\/j.ajsl.2021.10.002","journal-title":"Asian J. Ship. Logist."},{"key":"884_CR65","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.ajsl.2020.05.001","volume":"37","author":"C Senarak","year":"2021","unstructured":"Senarak, C.: Port cybersecurity and threat: a structural model for prevention and policy development. Asian J. Ship. Logist. 37, 20\u201336 (2021). https:\/\/doi.org\/10.1016\/j.ajsl.2020.05.001","journal-title":"Asian J. Ship. Logist."},{"key":"884_CR66","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s12198-018-0191-3","volume":"11","author":"LR Shapiro","year":"2018","unstructured":"Shapiro, L.R., et al.: Trojan horse risks in the maritime transportation systems sector. J. Transp. Secur. 11, 65\u201383 (2018). https:\/\/doi.org\/10.1007\/s12198-018-0191-3","journal-title":"J. Transp. Secur."},{"key":"884_CR67","doi-asserted-by":"publisher","DOI":"10.53656\/ped21-7s.16appr","author":"S Stoynov","year":"2021","unstructured":"Stoynov, S., Nikolov, B.: Approach to ship\u2019s it and ot systems cybersecurity improvement. Pedagogika-Pedagogy (2021). https:\/\/doi.org\/10.53656\/ped21-7s.16appr","journal-title":"Pedagogika-Pedagogy"},{"unstructured":"Sullivan, L.: Hypothesis Testing\u2014Analysis of Variance (ANOVA). Tech. rep. https:\/\/sphweb.bumc.bu.edu\/otlt\/mph-modules\/bs\/bs704_hypothesistesting-anova\/bs704_hypothesistesting-anova_print.html","key":"884_CR68"},{"key":"884_CR69","doi-asserted-by":"publisher","DOI":"10.3390\/jmse7100364","author":"B Svilicic","year":"2019","unstructured":"Svilicic, B., et al.: A study on cyber security threats in a shipboard integrated navigational system. J. Mar. Sci. Eng. (2019). https:\/\/doi.org\/10.3390\/jmse7100364","journal-title":"J. Mar. Sci. Eng."},{"doi-asserted-by":"publisher","unstructured":"Svilicic, B., et al.: Maritime cyber risk management: an experimental ship assessment. J. Navig. 72, 1108\u20131120 (2019). https:\/\/doi.org\/10.1017\/S0373463318001157","key":"884_CR70","DOI":"10.1017\/S0373463318001157"},{"key":"884_CR71","doi-asserted-by":"publisher","first-page":"231","DOI":"10.12716\/1001.13.01.24","volume":"13","author":"B Svilicic","year":"2019","unstructured":"Svilicic, B., et al.: Raising awareness on cyber security of ECDIS. TransNav 13, 231\u2013236 (2019). https:\/\/doi.org\/10.12716\/1001.13.01.24","journal-title":"TransNav"},{"key":"884_CR72","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/s12198-020-00222-2","volume":"13","author":"B Svilicic","year":"2020","unstructured":"Svilicic, B., et al.: Paperless ship navigation: cyber security weaknesses. J. Transp. Secur. 13, 203\u2013214 (2020). https:\/\/doi.org\/10.1007\/s12198-020-00222-2","journal-title":"J. Transp. Secur."},{"key":"884_CR73","doi-asserted-by":"publisher","first-page":"547","DOI":"10.1017\/S0373463319000808","volume":"73","author":"B Svilicic","year":"2020","unstructured":"Svilicic, B., et al.: Towards a cyber secure shipboard radar. J. Navig. 73, 547\u2013558 (2020). https:\/\/doi.org\/10.1017\/S0373463319000808","journal-title":"J. Navig."},{"unstructured":"TalTech. Introduction to cyber security. https:\/\/ois2.taltech.ee\/uusois\/subject\/VLL1480","key":"884_CR74"},{"unstructured":"The National Cybersecurity Agency of France. Best practices for cyber security on board ships (2017)","key":"884_CR75"},{"key":"884_CR76","doi-asserted-by":"publisher","first-page":"51","DOI":"10.1016\/0167-4048(93)90012-T","volume":"12","author":"CC Wood","year":"1993","unstructured":"Wood, C.C., Banks, W.W.: Human error: an overlooked but significant information security problem. Comput. Secur. 12, 51\u201360 (1993). https:\/\/doi.org\/10.1016\/0167-4048(93)90012-T","journal-title":"Comput. Secur."},{"key":"884_CR77","volume-title":"Statistics: An Introductory Analysis","author":"T Yamane","year":"1973","unstructured":"Yamane, T.: Statistics: An Introductory Analysis, 2nd edn. Harper & Row, New York (1973)","edition":"2"}],"container-title":["International Journal of Information Security"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00884-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10207-024-00884-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10207-024-00884-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,14]],"date-time":"2024-09-14T01:04:17Z","timestamp":1726275857000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10207-024-00884-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":77,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2024,10]]}},"alternative-id":["884"],"URL":"https:\/\/doi.org\/10.1007\/s10207-024-00884-2","relation":{},"ISSN":["1615-5262","1615-5270"],"issn-type":[{"type":"print","value":"1615-5262"},{"type":"electronic","value":"1615-5270"}],"subject":[],"published":{"date-parts":[[2024,7,10]]},"assertion":[{"value":"10 July 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}