語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
A Novel Framework for Maritime Security Assessments and Its Applications on the Shipping Industry. Cyber Security Examples.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
A Novel Framework for Maritime Security Assessments and Its Applications on the Shipping Industry. Cyber Security Examples./
作者:
Papageorgiou, Panayiotis.
面頁冊數:
1 online resource (139 pages)
附註:
Source: Masters Abstracts International, Volume: 84-04.
Contained By:
Masters Abstracts International84-04.
標題:
Terrorism. -
電子資源:
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=29360457click for full text (PQDT)
ISBN:
9798352607084
A Novel Framework for Maritime Security Assessments and Its Applications on the Shipping Industry. Cyber Security Examples.
Papageorgiou, Panayiotis.
A Novel Framework for Maritime Security Assessments and Its Applications on the Shipping Industry. Cyber Security Examples.
- 1 online resource (139 pages)
Source: Masters Abstracts International, Volume: 84-04.
Thesis (M.Phil.)--Liverpool John Moores University (United Kingdom), 2022.
Includes bibliographical references
Terrorism, piracy, robbery, cyber-threats on ships and port facilities, smuggling and drug trafficking through cargo and containers, etc., are some of the international security problems due to which the national maritime security services must provide solutions. Cyber-attack is considered particularly important due to the possibility to be combined with all the other security vulnerabilities in the shipping industry.It is clear that the maritime supply chain is particularly vulnerable to malicious acts resulting from criminal and terrorist elements. It is therefore necessary for the national maritime security services to take appropriate security measures in order to reduce the threats posed by these malicious elements.In fact there is no extensive and in-depth literature for the risk acceptance criteria concerning maritime security. Basic information is drawn from other areas, such as civil aviation. It is necessary to standardize these criteria, as is the case with the Formal Safety Assessment, where practitioners know how to gather information, to make comparisons with previous experience and to make decisions that are often based on experience from the past.Thus, the practice of security management in the maritime industry must be seen from a new perspective given the rapid changes that shipping is facing. The aim of the proposed study is to address the issue of maritime security through the development of a method applicable to the maritime industry that evaluates and manages security related risks and specifically maritime cyber risk.The main objectives of this study are: i) To critically analyse the existing maritime risk approaches. ii) To develop a method to address maritime cyber risk. iii) To illustrate through the application how this method could be used in practise. iv) To provide brief recommendation for future work.The proposed method uses the Bow-Tie diagram tool for the estimation of the risk. A risk computation procedure is described after the application of a set of prevention barriers, which is based mainly on the accuracy of the definition of the Probability Pi and the Contribution Ci of each Threat (i)as well as on the accuracy of the estimation of the Effectiveness value Eij, of each Prevention Barrier (j) for the same defined Threat (i), by the user.Similarly, the risk computation for each consequence, after the application of a set of mitigation barriers, is based mainly on the accuracy of the definition of the Risk Value RVi of each Consequence (i) as well as on the accuracy of the estimation of the Effectiveness value Eij, of each Mitigation Barrier (j) for the same defined Consequence (i), by the user.The results of the risk computation appear in the Bow-Tie diagram providing a coloured scheme of the obtained risk values for top event and consequences, after the introduction of the necessary prevention and mitigation barriers.The present work may be completed in the future, to perform cost benefit analysis, decision making procedures and training programmes.
Electronic reproduction.
Ann Arbor, Mich. :
ProQuest,
2023
Mode of access: World Wide Web
ISBN: 9798352607084Subjects--Topical Terms:
569041
Terrorism.
Index Terms--Genre/Form:
542853
Electronic books.
A Novel Framework for Maritime Security Assessments and Its Applications on the Shipping Industry. Cyber Security Examples.
LDR
:04355nmm a2200349K 4500
001
2354782
005
20230501063919.5
006
m o d
007
cr mn ---uuuuu
008
241011s2022 xx obm 000 0 eng d
020
$a
9798352607084
035
$a
(MiAaPQ)AAI29360457
035
$a
(MiAaPQ)LiverpoolJohnMoores17191
035
$a
AAI29360457
040
$a
MiAaPQ
$b
eng
$c
MiAaPQ
$d
NTU
100
1
$a
Papageorgiou, Panayiotis.
$3
3695151
245
1 2
$a
A Novel Framework for Maritime Security Assessments and Its Applications on the Shipping Industry. Cyber Security Examples.
264
0
$c
2022
300
$a
1 online resource (139 pages)
336
$a
text
$b
txt
$2
rdacontent
337
$a
computer
$b
c
$2
rdamedia
338
$a
online resource
$b
cr
$2
rdacarrier
500
$a
Source: Masters Abstracts International, Volume: 84-04.
500
$a
Advisor: Kontovas, Christos.
502
$a
Thesis (M.Phil.)--Liverpool John Moores University (United Kingdom), 2022.
504
$a
Includes bibliographical references
520
$a
Terrorism, piracy, robbery, cyber-threats on ships and port facilities, smuggling and drug trafficking through cargo and containers, etc., are some of the international security problems due to which the national maritime security services must provide solutions. Cyber-attack is considered particularly important due to the possibility to be combined with all the other security vulnerabilities in the shipping industry.It is clear that the maritime supply chain is particularly vulnerable to malicious acts resulting from criminal and terrorist elements. It is therefore necessary for the national maritime security services to take appropriate security measures in order to reduce the threats posed by these malicious elements.In fact there is no extensive and in-depth literature for the risk acceptance criteria concerning maritime security. Basic information is drawn from other areas, such as civil aviation. It is necessary to standardize these criteria, as is the case with the Formal Safety Assessment, where practitioners know how to gather information, to make comparisons with previous experience and to make decisions that are often based on experience from the past.Thus, the practice of security management in the maritime industry must be seen from a new perspective given the rapid changes that shipping is facing. The aim of the proposed study is to address the issue of maritime security through the development of a method applicable to the maritime industry that evaluates and manages security related risks and specifically maritime cyber risk.The main objectives of this study are: i) To critically analyse the existing maritime risk approaches. ii) To develop a method to address maritime cyber risk. iii) To illustrate through the application how this method could be used in practise. iv) To provide brief recommendation for future work.The proposed method uses the Bow-Tie diagram tool for the estimation of the risk. A risk computation procedure is described after the application of a set of prevention barriers, which is based mainly on the accuracy of the definition of the Probability Pi and the Contribution Ci of each Threat (i)as well as on the accuracy of the estimation of the Effectiveness value Eij, of each Prevention Barrier (j) for the same defined Threat (i), by the user.Similarly, the risk computation for each consequence, after the application of a set of mitigation barriers, is based mainly on the accuracy of the definition of the Risk Value RVi of each Consequence (i) as well as on the accuracy of the estimation of the Effectiveness value Eij, of each Mitigation Barrier (j) for the same defined Consequence (i), by the user.The results of the risk computation appear in the Bow-Tie diagram providing a coloured scheme of the obtained risk values for top event and consequences, after the introduction of the necessary prevention and mitigation barriers.The present work may be completed in the future, to perform cost benefit analysis, decision making procedures and training programmes.
533
$a
Electronic reproduction.
$b
Ann Arbor, Mich. :
$c
ProQuest,
$d
2023
538
$a
Mode of access: World Wide Web
650
4
$a
Terrorism.
$3
569041
650
4
$a
Cooperation.
$3
594090
650
4
$a
Robbery.
$3
3682343
650
4
$a
Decision making.
$3
517204
650
4
$a
Maritime law.
$3
649015
650
4
$a
Criminology.
$3
533274
650
4
$a
International law.
$3
560784
650
4
$a
Law.
$3
600858
655
7
$a
Electronic books.
$2
lcsh
$3
542853
690
$a
0627
690
$a
0616
690
$a
0398
710
2
$a
ProQuest Information and Learning Co.
$3
783688
710
2
$a
Liverpool John Moores University (United Kingdom).
$3
3556313
773
0
$t
Masters Abstracts International
$g
84-04.
856
4 0
$u
http://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=29360457
$z
click for full text (PQDT)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9477138
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入