2018
DOI: 10.1080/14778238.2018.1486789
|View full text |Cite
|
Sign up to set email alerts
|

Knowledge management methodology for identifying threats in maritime/logistics supply chains

Abstract: The growing complexity and the heterogeneity of critical infrastructures (CIs) in multicultural maritime and logistics networks challenge existing methods and tools to dynamically respond to the frequent change of information and to the lack of efficiently sharing security knowledge over the supply chain. This fosters a semantic gap, which causes disintegration in the supply-chain workflow and attracts cyber-attackers attention. This paper proposes a knowledge management methodology and an associated tool for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
22
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
4
3

Relationship

1
6

Authors

Journals

citations
Cited by 22 publications
(22 citation statements)
references
References 25 publications
0
22
0
Order By: Relevance
“…In multicultural maritime and logistics networks, the biggest challenge lies in the existing methods and tools to dynamically respond to the frequent change of information as well as the lack of efficiently sharing security knowledge over the supply chain [10]. Our study is different than [10] as we have provided a broader overview of the maritime cyber security challenges associated with marine vessels in deep seas. Our work is also the first study of its kind to describe and report the historical evidences of malfunctioning of digital components of an IBS.…”
Section: Related Workmentioning
confidence: 99%
“…In multicultural maritime and logistics networks, the biggest challenge lies in the existing methods and tools to dynamically respond to the frequent change of information as well as the lack of efficiently sharing security knowledge over the supply chain [10]. Our study is different than [10] as we have provided a broader overview of the maritime cyber security challenges associated with marine vessels in deep seas. Our work is also the first study of its kind to describe and report the historical evidences of malfunctioning of digital components of an IBS.…”
Section: Related Workmentioning
confidence: 99%
“…A structured body of cybersecurity knowledge using Knowledge Management practices to organize the knowledge [13,55].…”
Section: Security Challenges In Industrial Control Systemsmentioning
confidence: 99%
“…This is achieved by adopting knowledge management practices, which analyze in-depth inter-organizational and cross-organizational key-concepts of MLoSC critical services: Key-management processes, participating business partners and operating CPSs. The aforementioned approach implements a combined technique of process-centric and asset-centric views analyzed in Reference [55]. The process-centric view, depicted in Figure 1, defines the business processes and business partners' participation and collaboration in the provision of the supply chain service whereas the cyber-asset view, shown in Figure 2, identifies the cyber-assets operation and their interrelation within the supply chain service.…”
Section: A Novel Integrated Risk Management System and Servicesmentioning
confidence: 99%
See 2 more Smart Citations