scholarly journals Cyber security in marine transport

Pomorstvo ◽  
2021 ◽  
Vol 35 (2) ◽  
pp. 248-255
Author(s):  
Naser Abdel Raheem Al Ali ◽  
Anna A. Chebotareva ◽  
Vladimir E. Chebotarev

In recent years, the number of cyber attacks, virus carriers, and cybercrime on maritime transport facilities has increased significantly. The emergence of new types of maritime vessels, such as autonomous vessels, dependent entirely on information and communication technologies used for passengers, cargo and baggage transportation, requires legal regulation of relations in this area. Therefore, ensuring cybersecurity in maritime transport and the need to adopt appropriate legal norms, standards and measures at both the international and national levels to manage maritime cyber risks are considered one of the most relevant topics for maritime transport. There is no single, systematic integrated approach, unification of requirements and rules in cybersecurity’s sphere of maritime transport [15]. In this regard, the authors analyze the issues of ensuring cybersecurity in maritime transport, the legal basis of security: some international documents and national legal acts, regulating cybersecurity in maritime transport, will be considered, as well as the main question of how they are able to meet modern requirements for ensuring cybersecurity in maritime transport.

2021 ◽  
Vol 16 (1) ◽  
pp. 47-60
Author(s):  
Michaela Šimonová ◽  

The arrival of information and communication technologies is nothing new. The number of people using these technologies and moving in cyberspace is growing, and therefore it is an important role of the state to respond sufficiently to such developments. A fundamental role of the state is to create a stable security system consisting of complex legislation as well as creation of a legislative environment capable of responding flexibly to the growing number of diverse incidents in cyberspace. Sufficient legal regulation consisting of unambiguous determination of competencies and tasks of individual subjects represents the basic pillar for the creation of a stable security system. The role of the state is also to maintain existing and create new partnerships with organizations that are able to provide relevant information and knowledge in the field of cyber security.


2021 ◽  
Vol 109 ◽  
pp. 01012
Author(s):  
Tatiana Deryugina ◽  
Lyudmila Chegovadze ◽  
Albert Tumakov ◽  
Felix Vertlib

An analysis of problems occurring during the application of civil liability in legal relationships using information and communication technologies is being conducted in this scientific research. Apart from the absence of legal norms, there are conflict-of-laws rules, contradictions in which are to be resolved. The research of the turnover using digital technologies takes a big part in the legal doctrine. It must be noted that several fundamental works have appeared that make it possible to create a harmonious and non-contradictory system of legal regulation. However, there are still some unresolved questions left; for instance, ones concerning the mechanism of legal regulation of civil liability of subjects that have entered relations using digital technologies. The analysis of the civil law doctrine, the propositions of current Russian and international legislations, and legal practice have revealed a complex of problems connected to the civil liability of subjects entering legal relations using information and communication technologies. It became possible to systemize them depending on the subject and their role in the initiation or termination of the relation. A range of methods (general, general scientific and legal) has made it possible to make conclusions about the reasons why legal regulation is imperfect and why conflicts exist (to prevent them from happening in the future), formulate a legal regime of liability of subjects of the main or supporting group, suggest alterations to the current Russian legislation, aimed at bringing the owner of the information system to account.


Lex Russica ◽  
2019 ◽  
pp. 29-35
Author(s):  
O. E. Savenko

The relevance of the study lies in the existence of a larger range of socially significant processes taking place in the Internet. This has been made possible by the development of information and communication technologies and the formation of a network society. The key problem for lawyers is the construction of the legal regulation of certain actions performed in the Network and the protection of the rights of persons doing such actions. As a result of the study, the author has analized a number of actions in the field of matrimonial relations in the Internet that will improve the quality of life of citizens and will not harm personal and family values.The purpose of the study is to try to identify features of transformation of marriage and matrimonial relations in the context of development of globalization of the society and formation of a so-called network society. The objectives of the study include the analysis of features of the existence of marital and family relations in the context of a network society. The author uses various general scientific research methods: dialectical, systemic, logical, as well as special: observation, content analysis and other research methods.The author uses a system analysis of legal norms (legislative acts, departmental normative documents) and methods of comparative jurisprudence to study the issue and resolve the problem in question.


2021 ◽  
Vol 7 (4) ◽  
pp. 18-27
Author(s):  
Yulia Udovenko ◽  
◽  
Evgeniya Gladyshko ◽  

The article is devoted to the problem of bullying and anti-bullying policy in school institutions. The problem of bullying, from a scientific point of view, began to be studied at the end of the 20th century. Today, this issue is covered in all laws and programs related to ensuring a safe educational environment for participants in the educational process. Bullying, as a social and pedagogical problem, has been actively studied since the beginning of the development of information and communication technologies, which contributed to the rapid dissemination of not only verbal, but also media information: photo and video facts about manifestations of bullying between children. The article presents the results of the research "Unicef", "La Strada-Ukraine", which indicate the prevalence of the phenomenon of bullying among children. The essence of the concept of "bullying" is revealed, as well as categories that are close in meaning: "violence", "aggression", "bullying", "bullying", "conflict". The structural components of the roles of the bullying process are described: initiators or offenders, helpers of offenders, defenders of the victim, victims and observers. The article provides data on anti-bulging programs in foreign countries and focuses on the problem of anti-bulging policy in educational institutions of our country. Three main approaches that make up the anti-bullying policy of schools are analyzed: disciplinary, restorative and an integrated approach, which is implemented using two directions: managerial and educational. The directions of anti-bullying policy at school are presented, namely managerial and educational. The managerial direction is organized and implemented by the head of the educational institution. The constituent components of activities in this area are an analysis of the current situation in an educational institution, the development of an official position of the institution regarding bullying and informing all participants in the educational process about it, the development of rules of conduct for all participants in the educational process and informing about them, defining the responsibilities and responsibilities of participants educational process in relation to the rules of safe behavior in an educational institution, instructing employees, students and parents. Whereas the educational direction is characterized by informing, explaining, developing the skills of tolerance and non-violent communication of all participants in the educational process.


Author(s):  
Wojciech Dudek ◽  
Wojciech Szynkiewicz

A review of the known and an indication of the new threats for cyber-physical robotic systems, caused by cybernetic attacks, serves, in this paper, as a basis for the analysis of the known methods relied upon to detect and mitigate consequences of such attacks. A particular emphasis is placed on threats specific for cyber-physical systems, as they are a feature distinguishing these systems from their traditional Information and Communication Technologies (ICT) counterparts. Based on the review of literature and own analyses, unresolved issues regarding the cyber-security of robot systems are presented and discussed.


E-Management ◽  
2019 ◽  
pp. 61-66
Author(s):  
L. O. Gontar’

The article considers a problem of the definition of the digital economy, as well as presents a new theme on the legal procuring of international cyber security. The above mentioned new direction serves as an indicator of possible interdisciplinary research in the field of law and economics in the sphere of digital processes. As a justification the acts of the European Union have been adduced and their characteristic features, which consist in consideration of a substantial part of digital economy (economic party) have been allocated. This integration association has a unique structure and history, but the process of regulating the digital economy in the European Union began not so long ago. The European Union is one of the few integration associations that has started to work on improving the mechanisms of legal regulation of the digital market. This circumstance certainly affects the development of an integrated approach to the understanding of the digital economy, as well as further actualizes the issue of considering the legal procuring of international cyber security of this phenomenon. Legal procuring of security is a new direction in the international legal field, which will allow to consider the legal aspects in demand in the digital economy. The challenges in relation to international cyber security and the impact of the conceptual apparatus on the issues of the legal procuring of the security of the digital economy have been considered. It is important to note that the article suggests possible solutions to the problem posed. At the end of the article three proposals for improving approaches to the security of the digital economy have been elaborated. In terms of their qualitative characteristics, the proposals, undoubtedly, relate to legal and technical aspects, but also solutions regarding the conceptual component of the legal procuring of the security have been presented.


Author(s):  
Eric Luiijf

Advancements of information and communication technologies (ICT) cause infrastructure owners to augment current infrastructures with such ICT. The creation of more efficient and effective end-user services provides economical benefits and increases customer satisfaction. Concurrently, ICT advancements allow governmental and industrial sectors to develop complete new infrastructures and infrastructure services, the so called Next Generation Infrastructures (NGI). NGI will offer new services to society, end-users and the supply-chain of organisations and linked, dependent infrastructural services. For over fifty years, the introduction of new ICT-based services and infrastructures has been tightly coupled with failures in ICT-security. This chapter on NGI discusses the root causes of these security failures. Based on historical experiences, this chapter predicts threats and cyber security failures alike for the envisioned NGI such as smart (energy) grids, smart road transport infrastructure, smart cities, and e-health. This prediction will become reality unless fundamental changes in the approach to security of ICT-based and ICT-controlled infrastructures are taken.


2018 ◽  
pp. 132-150
Author(s):  
Taiseera Al Balushi ◽  
Saqib Ali ◽  
Osama Rehman

Initiatives carried by companies, institutes and governments to flourish and embellish the Information and Communication Technology (ICT) among the public have led to its penetration into every walk of life. ICT enhances the efficiency of various systems, such as the organisation and transfer of data. However, with the digital and remote access features of ICT comes the motivation towards financial, political and military gains by rivals. Security threats and vulnerabilities in existing ICT systems have resulted in cyber-attacks that are usually followed by substantial financial losses. This study discusses the security in ICT from a business, economic and government perspective. The study makes an attempt to understand the seriousness of the security issues and highlights the consequences of security breech from an economic perspective. Based on the performed analysis, the factors behind these attacks are provided along with recommendations for better preparations against them.


Author(s):  
Akanksha Sharma ◽  
Prashant Tandekar

Information and Communications Technologies (ICTs), particular the Internet, have been an increasingly important aspect of global social, political and economic life, and are the backbone of the global information society today. Their evolution and development has brought many benefits along with the threat of serious cyber-attacks that had been demonstrated over the past few years. Due to cybercrime business world drains huge money each year and incurs a large amount in resolving a single attack. It also damages organization's reputation and brand image, loss of intellectual property and sensitive data, loss of customer trust etc. Addressing major threats and challenges begins with setting up information security policy to ensure confidentiality, integrity and availability of company information and communication. Since telecom Sector is on its boom, a technological solution can solve the immediate challenges of identifying, investigating, and prosecuting computer- related crimes and changes required for long-term problem solving.


2020 ◽  
Vol 2020 ◽  
pp. 1-19
Author(s):  
Mustafa Senol ◽  
Ertugrul Karacuha

This paper presents a new national cyber security strategy (NCSS) covering the deterrence perspective from creation to implementation. With the aim of responding to and ensuring cyber security effectively, studies on which pathways should be followed and what methods should be used to develop, create, and implement a NCSS are being conducted in Turkey, as in all countries. In this context, by explaining the importance of cyber power, the need for cyber power to be considered as one of the elements of national power and the importance of providing security against cyber attacks with deterrence by cyber power are discussed, while a new and integrated approach for the creation and implementation of a NCSS and an authoritarian organizational structure responsible for this strategy is proposed. It can be concluded that the proposed effective and deterrent NCSS model and approaches might help to efficiently and effectively handle these issues for better management, control, and auditing for cyber security issues; provide new concepts for cyber security issues supported by cyber power and deterrence on this issue in the world; introduce integrated approach to cyber security strategies and policies on the stages of developing and implementing a NCSS; bring a number of issues to support cyber security and defence in different perspectives; and achieve a high degree of success, especially in terms of effectiveness and existing deterrence strategies and action plans of basic structure, with the proposed approach. Finally, it is expected that the proposed strategy, steps, and suggestions might help to improve cyber security issues and national strategies in near future to secure national assessment more than ever with a powerful concept of deterrence. In addition, this approach, which has been put forward for effective implementation of cyber security by ensuring better management, control, and supervision, can be easily used by all other countries.


Sign in / Sign up

Export Citation Format

Share Document