{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T00:24:12Z","timestamp":1774311852352,"version":"3.50.1"},"reference-count":46,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T00:00:00Z","timestamp":1559347200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,6]]},"DOI":"10.1109\/cybersa.2019.8899382","type":"proceedings-article","created":{"date-parts":[[2019,11,25]],"date-time":"2019-11-25T18:18:43Z","timestamp":1574705923000},"page":"1-8","source":"Crossref","is-referenced-by-count":19,"title":["Factors Affecting Cyber Risk in Maritime"],"prefix":"10.1109","author":[{"given":"Kimberly","family":"Tam","sequence":"first","affiliation":[]},{"given":"Kevin","family":"Jones","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2015.09.009"},{"key":"ref38","year":"2014","journal-title":"Security risks and weaknesses in ecdis systems"},{"key":"ref33","article-title":"Review of maritime transport","year":"0","journal-title":"United Nations Conference on Trade and Development (UNCTAD)"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s13437-018-0159-y"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1177\/107906320201400206"},{"key":"ref30","article-title":"Approaches to offender risk assessment: static vs dynamic","volume":"4","author":"bonta","year":"1999","journal-title":"Research Summary"},{"key":"ref37","year":"2017","journal-title":"Cyber security in the maritime industry"},{"key":"ref36","article-title":"Maritime cyber security white paper: Safeguarding data through increased awareness","year":"2015","journal-title":"ESCGS Cyber Security White Papers"},{"key":"ref35","year":"2014","journal-title":"Maritime cyber-risks"},{"key":"ref34","article-title":"Cyber sextortion","year":"2017","journal-title":"CPF 0002-17-CID361-9H"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2012.2221853"},{"key":"ref40","article-title":"Water treatment plant hacked, chemical mix changed for tap supplies","author":"leyden","year":"2016","journal-title":"The Register"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2016.07.018"},{"key":"ref12","article-title":"Fatal accident investigation report","year":"2005","journal-title":"Isomerization Unit Explosion Interim Report"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-30"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.800-82r2"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2012.08.010"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/CyberSecPODS.2018.8560690"},{"key":"ref17","year":"2018","journal-title":"Alliance Maritime Strategy"},{"key":"ref18","article-title":"Guidelines on cyber security onboard ships","year":"2017","journal-title":"BIMCO 2 0 ed Bagsvaerd"},{"key":"ref19","article-title":"International convention for the safety of life at sea","year":"1974","journal-title":"IMO"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1837274.1837461"},{"key":"ref4","article-title":"COSCO's cyber attack and the importance of maritime cybersecurity","author":"rajamanickam","year":"2018","journal-title":"FreightWaves"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.4018\/ijismd.2014010101"},{"key":"ref3","year":"2018","journal-title":"Allianz risk barometer"},{"key":"ref6","article-title":"Maritime cybersecurity: Cyber cases in the maritime enviroment","author":"belmont","year":"2016","journal-title":"American Association of Port Authorities"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s13437-019-00162-2"},{"key":"ref5","year":"2017","journal-title":"A P Moller Maersk improves underlying profit and grows revenue in first half of the year"},{"key":"ref8","article-title":"Guide for conducting risk assessments - information security","year":"2012","journal-title":"NIST Special Publication"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03552-4_16"},{"key":"ref2","year":"2018","journal-title":"Safety and shipping review"},{"key":"ref9","author":"lund","year":"2010","journal-title":"Model-Driven Risk Analysis The CORAS Approach"},{"key":"ref1","year":"2018","journal-title":"Shipping and World Trade"},{"key":"ref46","article-title":"Maritime cyber survey 2018 - the results","author":"fairplay","year":"2018","journal-title":"IHS Markit"},{"key":"ref20","article-title":"Lack of training causes ship accidents and detentions","author":"wingrove","year":"2016","journal-title":"Marine Electronics & Communications"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1007\/s13437-018-0156-1"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1080\/23738871.2018.1513053"},{"key":"ref21","article-title":"Human error and marine safety","author":"rothblum","year":"0","journal-title":"International Workshop on Human Factors in Offshore Operations (HFW2002)"},{"key":"ref42","article-title":"The state of cybersecurity in the rail industry","author":"collins","year":"2017","journal-title":"White Paper"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2016.01.003"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1049\/cp.2016.0692"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2013.11.014"},{"key":"ref44","author":"morris","year":"2017","journal-title":"Worlds first autonomous ship to launch in 2018"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/EmpiRE.2014.6890113"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.466"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.ress.2015.01.025"}],"event":{"name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","location":"Oxford, United Kingdom","start":{"date-parts":[[2019,6,3]]},"end":{"date-parts":[[2019,6,4]]}},"container-title":["2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8892713\/8899350\/08899382.pdf?arnumber=8899382","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,17]],"date-time":"2022-07-17T17:55:33Z","timestamp":1658080533000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8899382\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6]]},"references-count":46,"URL":"https:\/\/doi.org\/10.1109\/cybersa.2019.8899382","relation":{},"subject":[],"published":{"date-parts":[[2019,6]]}}}