Cyberattacks on ships: a wicked problem approach

Purpose: The maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security vulnerabilities for the maritime industry in cyberspace. Any obstruction in the global supply chain due to a cyb...

Full description

Bibliographic Details
Main Authors: Clott, C. (Author), Galvao, C.B (Author), Mileski, J. (Author)
Format: Article
Language:English
Published: Emerald Group Holdings Ltd. 2018
Subjects:
AIS
Online Access:View Fulltext in Publisher
LEADER 02025nam a2200217Ia 4500
001 10.1108-MABR-08-2018-0026
008 220706s2018 CNT 000 0 und d
020 |a 23973757 (ISSN) 
245 1 0 |a Cyberattacks on ships: a wicked problem approach 
260 0 |b Emerald Group Holdings Ltd.  |c 2018 
856 |z View Fulltext in Publisher  |u https://doi.org/10.1108/MABR-08-2018-0026 
520 3 |a Purpose: The maritime industry is increasingly impacted by the Internet of things (IoT) through the automation of ships and port activities. This increased automation creates new security vulnerabilities for the maritime industry in cyberspace. Any obstruction in the global supply chain due to a cyberattack can cause catastrophic problems in the global economy. This paper aims to review automatic identification systems (AISs) aboard ships for cyber issues and weaknesses. Design/methodology/approach: The authors do so by comparing the results of two receiver systems of the AIS in the Port of Houston; the JAMSS system aboard the Space Station and the “Harborlights” system for traffic control in the Port. Findings: The authors find that inconsistent information is presented on the location of same ships at the same time in the Port. Upon further investigation with pilots, the authors find that these inconsistencies may be the result of the strength of power with which an AIS is transmitted. It appears the power may be reduced to the AIS in port but that it varies within port and varies by pilot operators. This practice may open the AIS system for tampering. Originality/value: Further, this inconsistency may require further policy regulation to properly address cyber information in a port. © 2018, Pacific Star Group Education Foundation. 
650 0 4 |a AIS 
650 0 4 |a Cyberattack 
650 0 4 |a Maritime cybersecurity 
650 0 4 |a Ship automation 
650 0 4 |a Wicked problem 
700 1 |a Clott, C.  |e author 
700 1 |a Galvao, C.B.  |e author 
700 1 |a Mileski, J.  |e author 
773 |t Maritime Business Review