scholarly journals Enhancing Navigator Competence by Demonstrating Maritime Cyber Security

2018 ◽  
Vol 71 (5) ◽  
pp. 1025-1039 ◽  
Author(s):  
Odd Sveinung Hareide ◽  
Øyvind Jøsok ◽  
Mass Soldal Lund ◽  
Runar Ostnes ◽  
Kirsi Helkala

As technology continues to develop, information and communication technology and operational technology on board ships are increasingly being networked, and more frequently connected to the Internet. The introduction of cyber systems changes the work environment with the aim of decreasing the workload for the navigator, but at the same time introduces more complexity and vulnerabilities that in turn may alter the competencies needed to perform safe and efficient navigation. Contemporary examples of how cyber-attacks can distort situational awareness and interfere with operations are needed to enhance the navigator's competence through increased system awareness. This paper demonstrates some of the possible attack vectors that a cyber-attack can present to a ship, as well as discussing the plausibility and consequences of such attacks. In this study we provide a practical example to better understand how one can demystify cyber threats in order to enhance the navigators' competence.

2021 ◽  
Vol 19 (1) ◽  
pp. 70-94
Author(s):  
Ivo Juurvee ◽  
Uku Arold

Disruptive developments in the field of information and communication technology have enabled malicious actors to turn elements of the digital ecosystem into information weapons in hybrid conflict.  Estonia has tackled the new security realm with comprehensive national defence that is built upon understanding that the society itself is object of security and should provide appropriate safeguards and responses. Estonian conceptualisations of national cybersecurity, cyber psychological defence, strategic communications are elaborated in the light of actual seminal threat situations. Analysis of evolvement of the strategic documents guides the recommendations for even deeper blend of the technical cybersecurity culture with value-centric psychological defence and internationalisation of information security situational awareness and planning.


2018 ◽  
Vol 1 (2) ◽  
pp. 12
Author(s):  
Pedro Vitor de Sousa Guimarães ◽  
Sandro César Silveira Jucá ◽  
Renata Imaculada Soares Pereira ◽  
Ayrton Alexsander Monteiro Monteiro

This paper describes the use of a Linux embedded system for use in digital information and communication technology in order to generate image warnings using Internet of Things (IoT) prin- ciples. The proposed project generated a product, developed using concepts of project-based learning (ABP), called SECI (electronic internal communication system) that is accessed by students to view online warnings by distributed monitors and also by mobile devices connected to the Internet.


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


2021 ◽  
Vol 8 (11) ◽  
pp. 246-258
Author(s):  
Dewi Kartika ◽  
Amrin Fauzi ◽  
Arlina Nurbaity Lubis

The rapid development of information and communication technology is currently having an impact on changes in various fields, one of which is changes in people's lifestyles, including consumption in society. The development of information and communication technology has resulted in easier access for people in the world to access the internet and use it to buying and selling transactions online via the internet. The report Global Web Index notes that Indonesia has a high level of users e-commerce highest in the world and as many as 96% of internet users looking for a product or service to make purchases online. This has resulted in the development of e-commerce in Indonesia and throughout the world which is increasing as a consequence of which the competition is getting harder service providers are e-commerce required to provide the best service in order to increase customer satisfaction and trust so that customers will be loyal to using these services. This can be achieved by paying attention to customer value and corrective actions in an effort to restore service to customers. The purpose of this study was to analyze the effect of customer perceived value and e-service recovery on e-loyalty with e-satisfaction and e-trust as intervening variables. This study uses a quantitative approach by distributing questionnaires to ecommerce Shopee Indonesia customers in Medan City with a total sample of 328 respondents. The sampling technique in this study used non-probability sampling. Data analysis was carried out through SEM-PLS using the SmartPLS program. The results of this study indicate that customer perceived value has a significant effect on e-satisfaction and also e-loyalty. However, customer perceived value has no significant effect on e-trust. The variable e-service recovery directly has a significant effect on e-satisfaction, e-trust, and e-loyalty. E-satisfaction and e-trust cannot mediate the relationship between customer perceived value and e-loyalty, but they are able to mediate the relationship between e-service recovery and e-loyalty. Keywords: Customer perceived value, E-Service Recovery, E-Satisfaction, ETrust, E-Loyalty.


2020 ◽  
Vol 1 (2) ◽  
pp. 91-111
Author(s):  
Indah Maya Sari

Abstract   Overpopulation in an area will affect labor market conditions, which is characterized by an increase in the number of unemployed in highly populated areas. Entrepreneurship is one solution that can help the economic condition. The entrepreneur can solve excess labor or help reduce unemployment. The high number of women in West Sumatra each year is a huge potential, especially in entrepreneurship. Success in entrepreneurship is the goal of every woman in entrepreneurship. This research aims to see how the factors of marital status, experience, and use of Information and Communication Technology (ICT) such as the use of the telephone and the internet influence women's success in entrepreneurship. This study uses primary data “raw data” Susenas 2019. The results show that marital status, telephone use and internet use and experience influence women's success in entrepreneurship in West Sumatra.   Abstrak   Overpopulasi di suatu daerah akan mempengaruhi kondisi pasar kerja yang ditandai dengan meningkatnya jumlah pengangguran di daerah berpenduduk tinggi. Kewirausahaan merupakan salah satu solusi yang dapat membantu kondisi perekonomian tersebut. Wirausaha dapat menyelesaikan kelebihan tenaga kerja atau membantu mengurangi jumlah pengangguran. Tingginya jumlah penduduk wanita di Sumatera Barat setiap tahun merupakan potensi yang sangat besar, khususnya dalam berwirausaha. Sukses berwirausaha merupakan tujuan setiap wanita dalam berwirausaha. Penelitian ini bertujuan untuk melihat bagaimana faktor status perkawinan, pengalaman, dan penggunaan Teknologi Informasi dan Komunikasi (TIK) seperti penggunaan telepon, dan internet dalam mempengaruhi keberhasilan wanita dalam berwirausaha. Penelitian ini menggunakan data primer yaitu “raw data” Susenas tahun 2019. Hasil penelitian menunjukkan bahwa status perkawinan, penggunaan telepon dan penggunaan internet serta pengalaman berpengaruh terhadap keberhasilan wanita dalam berwirausaha di Sumatera Barat.


Author(s):  
Ana Kovacevic ◽  
Dragana Nikolic

We are facing the expansion of cyber incidents, and they are becoming more severe. This results in the necessity to improve security, especially in the vulnerable field of critical infrastructure. One of the problems in the security of critical infrastructures is the level of awareness related to the effect of cyberattacks. The threat to critical infrastructure is real, so it is necessary to be aware of it and anticipate, predict, and prepare against a cyber attack. The main reason for the escalation of cyberattacks in the field of Critical Infrastructure (CI) may be that most control systems used for CI do not utilise propriety protocols and software anymore; they instead utilise standard solutions. As a result, critical infrastructure systems are more than ever before becoming vulnerable and exposed to cyber threats. It is important to get an insight into what attack types occur, as this may help direct cyber security efforts. In this chapter, the authors present vulnerabilities of SCADA systems against cyber attack, analyse and classify existing cyber attacks, and give future directions to achieve better security of SCADA systems.


2018 ◽  
pp. 132-150
Author(s):  
Taiseera Al Balushi ◽  
Saqib Ali ◽  
Osama Rehman

Initiatives carried by companies, institutes and governments to flourish and embellish the Information and Communication Technology (ICT) among the public have led to its penetration into every walk of life. ICT enhances the efficiency of various systems, such as the organisation and transfer of data. However, with the digital and remote access features of ICT comes the motivation towards financial, political and military gains by rivals. Security threats and vulnerabilities in existing ICT systems have resulted in cyber-attacks that are usually followed by substantial financial losses. This study discusses the security in ICT from a business, economic and government perspective. The study makes an attempt to understand the seriousness of the security issues and highlights the consequences of security breech from an economic perspective. Based on the performed analysis, the factors behind these attacks are provided along with recommendations for better preparations against them.


Author(s):  
Mahmud Akhter Shareef ◽  
Vinod Kumar ◽  
Uma Kumar ◽  
Abdul Hannan Chowdhury ◽  
Subhas C. Misra

Though many countries are still just beginning to grasp the potential uses and impacts of Electronic-government (EG), advances in technologies and their applications continue. Observing the proliferation of EG, countries are increasingly turning to the Internet to market their EG system to gain a competitive advantage. However, the effectiveness and efficiency of such online government systems largely depends on the mission of implementing EG. For successful adoption and implementation of EG, it is essential that a country first identify an explicit objective and a specific strategy. We have examined implemention strategies of EG of seven diverse countries whose objectives and mission for implementing EG differ significantly. However, they have the following strategies in common: i) extensive application of information and communication technology (ICT) in the public sector; ii) overall reformation of the public sector; iii) development of a better quality service structure; and iv) more cohesive integration of citizens with government.


Author(s):  
Jengchung V. Chen ◽  
Yu-Hsiang Wang

Since the Internet and other IT technologies have become more popular than ever before, the amount of time people spend with computers and IT products, such as Internet and online games, has increased tremendously. The continuing boom of information and communication technology is causing the Internet to become a part of everyone’s life. People use the Internet not only as a tool for their jobs, but also to participate in virtual communities. Even if the rate of Internet uptake slows considerably (Weisenbacher, 2002), the trend still remains growing. There were 275.5 million people using the Internet in February 2000. That number had changed to 605.60 million in September 2002 (Nua Ltd., 2002). According to Horrigan’s study (2001), 84 percent of Internet users in America have participated in a virtual community. Moreover, apart from the number of people using Internet, the average time spent doing any activity online is increasing.


Electronics ◽  
2020 ◽  
Vol 9 (5) ◽  
pp. 770
Author(s):  
Shengxuan Weng ◽  
Yanman Li ◽  
Xiaohua Ding

The coordinated scheduling of plug-in electric vehicle (PEV) charging should be constructed in distributed architecture due to the growing population of PEVs. Since the information and communication technology makes the adversary more permeable, the distributed PEV charging coordination is vulnerable to cyber-attack which may degrade the performance of scheduling and even cause the failure of scheduler task. Considering the tradeoff between system-wide economic efficiency, distribution level limitations and PEV battery degration, this paper investigates the resilient distributed coordination of PEV charging to resist cyber-attack, where the steps of detection, isolation, updating and recovery are designed synthetically. Under the proposed scheduling scheme, the misbehaving PEVs suffering from cyber-attack are gradually marginalized and finally isolated, and the remaining well-behaving PEVs obtain their own optimal charging strategy to minimize the total system cost in distributed architecture. The simulation results verify the effectiveness of theoretical method.


Sign in / Sign up

Export Citation Format

Share Document