Publication Cover
Maritime Policy & Management
The flagship journal of international shipping and port research
Volume 51, 2024 - Issue 3
5,770
Views
7
CrossRef citations to date
0
Altmetric
Research Article

Maritime cybersecurity: are onboard systems ready?

, ORCID Icon, ORCID Icon, ORCID Icon & ORCID Icon

ABSTRACT

Recent maritime cybersecurity accidents reveal that shipping is facing increased exposure to cyber threats, especially due to the fast-growing digitalisation of the sector, leaving vessels and their onboard systems vulnerable to cyberattacks. This research aims at evaluating the relationship among the critical dimensions influencing cybersecurity performance in the maritime industry. To achieve this, six critical dimensions related to cybersecurity preparedness are first identified through literature review, namely ‘regulations’, ‘company procedures’ from a managerial perspective and ‘shipboard systems readiness’, ‘training and awareness’, ‘human factor’ and ‘compliance monitoring’ at an operation level. A Likert-scale questionnaire is designed and used to collect empirical data from 133 seafarers and shore-based staff. Structural Equation Modelling (SEM) is applied to examine the causal relationships between the six dimensions and shipboard cybersecurity performance. The results show that ‘regulations’ positively influence shipping companies’ cybersecurity-related ‘procedures’, which in turn positively affects ‘shipboard systems readiness’, ‘training and awareness’, and ‘monitoring’. Further, ‘training and awareness’ positively influences the cybersecurity performance of ships. The results have profound implications for the shipping industry on how to strengthen their cyber practices in order to improve their cybersecurity performance. Recommendations for future academic research related to maritime cybersecurity are also provided.

1. Introduction

Cybercrime is recognised as one of the most significant threats any company would face in the next decades. According to Cybersecurity Ventures (Citation2020), the costs of global cybercrime are expected increasing 15% per year between 2021 and 2025, and reaching USD 10.5 trillion by 2025, compared to USD 3 trillion in 2015. The introduction of automation, integration and the drive for digitalisation of systems and processes for optimising management processes makes ships increasingly prone to cyberattacks (Kala and Balakrishnan Citation2019).

A cyber incident poses a major risk to the maritime sector, which might lead to severe consequences in terms of human casualties, economic and environmental ramifications (Alcaide and Llave Citation2020). Cyberattacks are, therefore, considered important threats to the maritime industry. Vulnerabilities in hardware, software and network systems are exploited by cybercriminals, for example, by introducing malware into the victim’s equipment. The motive behind such attacks can be manifold and not limited to data theft, financial gains, disruption of service, obtaining intelligence, gaining media attention and political vendetta (CaproCaprolu et al. Citation2020; Kala and Balakrishnan Citation2019). Large companies (e.g. Maersk Line, BW group, COSCO) have witnessed serious attacks in the past, resulting in data breaches and significant commercial losses (Sakar et al. Citation2019). Even the global maritime regulatory body, the United Nations’ International Maritime Organization (IMO) was cyberattacked in September 2020 (Kuhn, Bicakci, and Shaikh Citation2021).

Some research has been conducted on cybersecurity issues in the maritime industry focusing mainly on hazards/threats influencing cybersecurity (e.g., Chang et al. Citation2019), policies and measures (Tam and Jones Citation2018), and training of maritime professionals (Tam, Moara-Nkwe and Jones Citation2020). However, there is a lack of sufficient analysis on the relationship between the critical factors and cybersecurity performance in the maritime industry, and it is widely recognised that such a relationship analysis is essential for effective risk control/management (e.g., Yang et al. Citation2018). To that extent, this work aims at evaluating the relationship between the critical dimensions and cybersecurity performance in the maritime sector. The key dimensions refer to the recognised groups of crucial risk factors influencing ship onboard cybersecurity performance (Chang et al. Citation2019).

This research adopts the ‘Diffusion of innovations’ theory to explain how the novel concept of cybersecurity is adopted by the relatively conservative maritime industry. Six critical dimensions that influence maritime cybersecurity performance are discussed in the literature review section, including ‘regulatory framework’, ‘company procedures’ from a managerial perspective, and ‘shipboard systems readiness’, ‘cyber training and awareness’, ‘compliance monitoring’ and ‘human factor’ at an internal operational level. A Likert-scale questionnaire is designed for collecting empirical data from 133 seafarers and onshore shipping company staff. This research further applies Structural Equation Modelling (SEM) to analyse the interrelationship amount the factors and cybersecurity performance in the maritime sector. The contributions of this research include: (1) provision of useful insights on the important factors that affect cybersecurity performance on ships, which could be further explored in order to identify measures to enhance maritime cybersecurity; (2) a new definition of maritime cybersecurity performance, as well as a novel causal relationship framework for modelling maritime cybersecurity factors and performance; (3) a number of cybersecurity policy recommendations for the interested parties.

The rest of this paper is structured as follows. Section 2 provides a literature review by identifying the critical dimensions affecting the cybersecurity performance of ships. Section 3 describes the research methodology and the hypotheses. The study findings and discussion are presented in Sections 4 and 5 respectively, the conclusions are drawn in Section 6.

2. Literature review

2.1. Diffusion of innovations theory

‘Diffusion of innovations’ theory, proposed by Rogers (Citation1995), addresses how the public accepts new innovations (e.g., technologies, concepts, products). The process of acceptance of innovation includes the following five steps: awareness, interest, evaluation, trial and adoption. The theory has been applied in various areas such as mobile applications (Min, So, and Jeong Citation2019), environmental construction (Sartipi Citation2020), transportation (Nordhoff et al. Citation2021; Wang, Douglas, and Hazen Citation2021), and cybersecurity (Miron and Muita Citation2014). Our study is in line with this theory because the maritime industry has a long history of using established techniques as the best practice. Compared to other main classical transport modes (e.g., aviation), it often sits back in terms of accepting innovative technologies, especially for addressing safety and security that are often driven by accidents in a reactive way.

2.2. Critical factors influencing maritime cybersecurity

The section will elaborate on the critical factors influencing the cybersecurity of ships. Based on a thorough survey of the relevant literature, the following six critical dimensions are identified, reviewed, and categorised as the fundamentals affecting the cybersecurity performance of ships. Their definitions, justification of selection and supporting references are described in detail in the ensuing sections.

2.2.1. Regulatory framework

The International Maritime Organisation (see IMO document MSC-FAL.1/Cir. 3) provides recommendations for addressing the cyber risks associated with the industry and developing and implementing best practices through the company’s safety management system (CaproCaprolu et al. Citation2020). The guidelines follow the five-step framework of the United States National Institute of Science and Technology (NIST) i.e. identify, protect, detect, respond and recover and have become mandatory for all ships following the company’s first annual verification of the Document of Compliance (DOC) after January 1st, 2021 (Kala and Balakrishnan Citation2019). Its compliance will be inspected by Port State Control officers (Wingrove Citation2021).

Many other entities such as classification societies, associations and unions have developed individual guidelines for the protection of ships, ports and connected organisations from cyber-crimes. For instance, BIMCO proposes a guideline for shipboard Information Technology (IT) and Operational Technology (OT) systems for the identification of threats and vulnerabilities, their assessment, development of mitigation and contingency measures, and responding and recovering from such threats (BIMCO, CLIA, ICS, Intercargo, Intermanager, Intertanko, IUMI, OCIMF and World Shipping Council Citation2020). American Bureau of Shipping (American Bureau of Shipping (Citation2016)) presents guidelines for marine and offshore operations on cybersecurity, best practices, criteria for assessment of systems/assets and certification, concepts of data integrity, software systems verification and quality management. Lloyd’s Register (Citation2016) provides guidelines for stakeholders on the design, installation, integration and operation of digitally enabled systems onboard ships and marine platforms to understand the implications of technology in digital systems. DNV-GL (Citation2016) also provides guidance on the application of standards such as ISO/IEC 27001 and ISA-99/IEC-62443 (standard for OT security of industrial control systems such as Global Positioning System (GPS)).

2.2.2. Cyber security-related company procedures

In compliance with the IMO (Citation2017) guidelines, plans and procedures will need to be devised, taking into consideration the relevant standards, and guidelines to ensure the safety of ships/crew and the protection of the marine environment.

An effective company cybersecurity strategy would involve designing a policy in cooperation with the organisation and the stakeholders, and addressing key areas such as risk management, resource management, strategic alignment with the organisation, performance measurement, value delivery and integration with security. This will encompass the identification of key systems with respect to safety, operations and environmental protection and the level of acceptable risk for these (Kala and Balakrishnan Citation2019). The requirements as per the IMO’s International Safety Management (ISM) Code and the International Ship and Port Facility Security (ISPS) Code should now be matched with companies’ plans and procedures for cyber risk management.

2.2.3. Ship’s systems readiness

IT and OT systems onboard ships have been integrated through network connectivity and the internet for improving performance, making them prone to cyberattacks. Attackers could hack the cyber-enabled systems through loosely secured network connections and bypass firewalls to disrupt services in order to steal data for selling or ask for ransom, to facilitate the illegal movement of cargo, to gather intelligence and knowledge of critical systems/infrastructure, for political gains, and many more, including even the use of the vessel as a weapon to attack other potential targets (CaproCaprolu et al. Citation2020).

It is also possible to undertake an attack on essential navigation equipment such as Automatic Identification System (AIS), Electronic Chart Display and Information System (ECDIS), GPS, Voyage data recorder (VDR) through jamming and. The disruption of these systems can result in severe consequences (e.g., collision or grounding) and may lead to human losses and/or pose a danger to the environment. IHS Fairplay (Citation2016) conducts a survey and finds that several onboard systems including shipboard systems including GPS, ECDIS and Engine Control are very vulnerable to attacks.

Outdated software systems also pose a tangible cybersecurity risk and lack of timely application of patches/updates can also render the current systems vulnerable (Jones, Tam, and Papadaki Citation2016). Tam and Jones (Citation2019) conduct a survey and disclose that 79% of the participants feel that shipboard computers and their internet activity are the weakest links. Sakar et al. (Citation2019) study 14 Tukey-based shipping companies using semi-structured interviews to gain some understanding of their preparedness both ashore and onboard ships for dealing with cyber risks. They reveal that the shipboard IT systems are not fully protected against cyber threats and required investments for improvement.

2.2.4. Cyber training and awareness

Recent cyber incidents in the maritime industry have revealed that many employees are not trained to respond appropriately to cyber threats, potentially leading to behaviour that does not contribute much to minimising risks and managing the issue (DNV-GL Citation2016). Previous studies have stated that cyber training raises awareness which in turn enhances cybersecurity (Bolat and Kayisoglu Citation2019; El-Bably Citation2021). Through comprehensive and regular training, sea crews would have awareness of what activities may cause cyberattacks and sufficient knowledge to mitigate the impact of being cyberattacked.

IMO doc. MSC-FAL.1/Circ.3 stated that there is an urgent need to raise awareness to have effective maritime cyber management. Tam and Jones (Citation2019) analysed the factors affecting security and individual training levels, and find that most of the respondents consider the standards of crew training as the biggest issue. Svilicic et al. (Citation2019) also found that the likelihood of lack of training and awareness to seafarers is the highest among their identified cyber threats. To avoid cyber assaults and to prepare both the crew and on-shore personnel to deal with such threats, training and awareness in cybersecurity-related matters is required (Chang et al. Citation2019). Training can be imparted to the company IT professionals for raising the defence skills, and the ship’s crew who lack the expertise and the background but play a crucial role in emergency and crisis management (Tam, Moara-Nkwe, and Jones Citation2020). Overall, crew awareness and readiness can constitute the primary barrier against any kind of cyberattack guided on ships (Alcaide and Llave Citation2020).

2.2.5. Compliance monitoring

To comply with the IMO’s cyber regulations, organisations need to determine their cybersecurity priorities by conducting a risk assessment to identify risks and weaknesses specific to their ships and, then, adopt effective cyber control measures and industry best practices to mitigate them (Whitterker Citation2016). Enforcement of the IMO’s Guidelines will be verified by Port State Control officers in a way that the ships do not only need to carry the required certificates and documents but also to prove through their procedures a good understanding of cyber risks. Failure to appropriately address cyber risks as per the Guidelines would result in non-compliance, fines and other actions that could follow based on the identified deficiencies (Wingrove Citation2021).

Regular internal and external audits can assist in re-evaluating the cybersecurity measures in place and provide an early indication of loopholes and weaknesses in the system. Any pitfalls could be bridged timely to maintain efficient and sound security practices.

2.2.6. Human factor

Around 80% to 90% of maritime accidents are attributed to human factors (Macrae Citation2009; Heij and Knapp Citation2018; Chang et al. Citation2021). Humans are seen as the weakest link in the management of cybersecurity and lack of knowledge and awareness on their part can result in human errors (Boyce et al. Citation2011; El-Bably Citation2021). According to an IBM report, 95% of cyber security breaches are caused by human error and may result in unauthorised access through a secure door or barrier, the so-called ‘tailgating’ (IBM Citation2014). Such breaches may cause data loss, disruption of service or even using ships as a potential weapon and can therefore result in economic losses and/or environmental damages.

The modern-day sophisticated systems onboard vessels are operated by a staff who are rotated on a variety of ships with different systems thereby making them unfamiliar and prone to errors in the management of security breaches (Hopcraft and Martin Citation2018). A number of cybersecurity-related human errors can be linked to any of the following activities such as accessing suspicious websites or links or disabling firewalls due to carelessness or for a specific purpose, using personal devices on shipboard systems, etc.

2.3. Cybersecurity performance

The term ‘cybersecurity performance’ is in general described as the security performance of an entity from a cyber perspective. It has been used in the academic literature. For instance, Lee (Citation2021) proposed a new framework for cyber risk management that includes four layers: cyber ecosystem, cyber infrastructure, cyber risk assessment and cyber performance, which includes three activities (i.e., implementation, monitoring and controlling, and continuous improvement). Garcia-Perez, Sallos, and Tiwasing (Citation2021) defined four indicators for cybersecurity performance, including Focus (provision of foundational cybersecurity element), Capability, Resilience and Prep (cybersecurity training and preparation efforts). However, there is no universally accepted definition of cybersecurity performance. Through the description of cybersecurity performance from the existing research, we propose the following definition of maritime cybersecurity performance: the effectiveness and efficiency of a range of actions taken to prevent or mitigate the impact of cyberattacks on OT/IT systems of ships, as well as the financial performance and reputation of companies.

We have identified five main ship systems, which need protection against cybercrimes, namely, navigation systems, plant and machinery, communication systems, OT, and IT systems. Loss or compromise of any of these systems can impact the operational capability and efficiency and jeopardise the safety of their ship and staff (Boyes and Isbell Citation2017). Cybercrimes affect the safety of navigation by exploiting the vulnerabilities of some of the essential navigation equipment such as AIS, GPS, ECDIS, VDR, and communication systems. These systems can be hacked, jammed, spoofed and servicse can be disrupted, which can lead to disastrous consequences such as collisions and groundings etc. Such incidents would not only lead to severe economic losses but also result in environmental pollution, which can in turn damage habitats and ecosystems. Other cases may involve the breach of systems to manipulate data such as cargo manifests in order to carry out a theft of cargo or obtain the client’s confidential information. Such devastating effects of cybercrimes can damage the reputation of shipping companies and result in further business disruption.

Considering the growing threat of cybercrimes on ships and their devasting consequences on the reputation and the financial performance of shipping companies, an indepth study is needed to enhance the cybersecurity performance of ships by focusing on efficient cybersecurity practices. To address it, new research hypotheses are proposed in Section 2.4.

2.4. Research hypotheses

To examine how the above six dimensions affect the overall cybersecurity performance of ships, nine hypotheses are proposed in this paper.

Adoption of a cyber regulatory framework and guidelines can ensure that organisations develop a robust cybersecurity management system to address cyber threats using proven risk management principles to prioritize security activities and performance within the organisation (Belmont Citation2014). Hence, the following hypothesis is proposed:

H1—Regulatory framework positively impacts company procedures

Effective company cyber procedures may improve cybersecurity through several internal operational factors. Shipping companies can utilise specific security procedures and policies for the management of digital/technology enabled systems and networks to enhance the resilience and robustness of the systems (BIMCO, CLIA, ICS, Intercargo, Intermanager, Intertanko, IUMI, OCIMF and World Shipping Council Citation2020). Moreover, effective policies and procedures can also enhance the cybersecurity awareness of staff by addressing training requirements based on their roles (Bolat and Kayisoglu Citation2019). Procedures can impact company training plans and further enhance staff cybersecurity awareness. In addition, a proper cybersecurity procedure can provide a clear guideline for the requirement of cybersecurity monitoring. Monitoring, reviewing and auditing requirements of cyber critical ship systems and processes are defined by the organisational procedures and plans (Boyes and Isbell Citation2017; DNV-GL Citation2016). This includes verification of controls and identification of gaps for ensuring enhanced protection against such crimes. Besides, straightforward cybersecurity procedures can reduce human errors and prevent their negative impacts (Chang et al. Citation2019). Hence, the following hypotheses are proposed:

H2—Cyber procedures have a positive effect on the resilience and robustness of ship’s systems

H3—Cyber procedures have a positive impact on cyber training and awareness

H4—Cyber procedures have a positive impact on compliance monitoring

H5—Cyber procedures have a negative impact on the occurrence of human factor

On the other side, proper implementation of internal operations can lead to better cybersecurity performance. The resilience of shipboard systems is closely linked to the vessel’s safety and operational capability (Boyes and Isbell Citation2017). Systems with up-to-date firewalls and antivirus software to deal with cyberattacks can largely improve cybersecurity performance and further enhance the company’s competitiveness (Chang et al. Citation2019). Moreover, with the growing use of technology in shipboard functions, a lack of cyber-related training and staff/seafarers’ cybersecurity awareness becomes detrimental. Training can help respond to cyber risks more proactively and enhance safety and security (Chang et al. Citation2019; Tam, Moara-Nkwe, and Jones Citation2020). In addition, regular monitoring and inspections of network components can help organisations to analyse their cybersecurity measures and further mitigate the impact of cybersecurity risk (Pandey et al. Citation2020). In addition, information security breaches related to human factors can result in serious consequences such as losses of revenue, productivity, reputation and competitive advantage (Chang et al. Citation2019). This leads us to the following hypotheses:

H6—Resilience of onboard systems has a positive impact on ship’s cybersecurity performance.

H7—Cyber training and awareness has a positive impact on ship’s cybersecurity performance.

H8—Cyber compliance monitoring has a positive impact on ship’s cybersecurity performance

H9—Human factor has a negative impact on ship’s cybersecurity performance

A conceptual model to illustrate the relationship of the above nine hypotheses is shown in .

Figure 1. Conceptual research framework.

Figure 1. Conceptual research framework.

3. Methodology

3.1. Data collection

To ensure collecting adequate representation for the research, a non-probability convenience sampling combined with a snowball sampling technique is used. The target sample for the study is seafarers and shipping company staff, who are directly responsible for implementing and monitoring cybersecurity measures on ships. A five-point Likert scale (1: Strongly Disagree, 2: Disagree, 3: Neutral, 4: Agree, 5: Strongly Agree) questionnaire has been utilised through an online survey tool and a total of 150 questionnaires are sent out to ensure an unbiased response and an adequate representation in May 2021. The academic literature that inspired the question item design is listed in Appendix A. The main reasons for using an online survey are its advantages of easiness of administration and analysis, and to capture more respondents (including seafarers who have busy and irregular schedules, and are spread all across the world).

3.2. Analysis method

First, we conduct a descriptive analysis using SPSS 27 to derive the respondents’ perception towards the cybersecurity readiness of ships. Reliability and validity tests are performed using the Composite Reliability (CR) and Average Variance Extracted (AVE) metrics. CR and AVE values are calculated using EquationEquations (1Equation2) respectively (Chang et al., Citation2021):

(1) C.R.=1nλ21nλ2+1n1λ2(1)
(2) AVE=1nλ21nλ2+1n1λ2(2)

where λ is factor loading and n is the number of items under each dimension.

Confirmatory Factor analysis (CFA) has also been performed for finding a direct and indirect correlation between the factors. Thereafter a Structural Equation Modelling (SEM) analysis is employed to test the specified hypotheses. SEM is a multivariate analysis for simultaneously investigating complex causal relationships among observable variables and latent variables, as well as between latent variables; see Kline (Citation2016) for more on SEM. The observable variables are the question items, whereas the latent variables are the seven identified dimensions. Each dimension has several relevant questions. Compared to normal regression that can also analyse causal relationships, the advantage of SEM is the ability to simultaneously investigate the whole model with both measurement and structural considerations (Kao, Stewart, and Lee Citation2009). SEM has been widely applied in the maritime research domain; see for example Lu, Shang, and Lin (Citation2016), Lu et al. (Citation2020)), Lin and Chang (Citation2021).

Through this SEM analysis, the nine proposed hypotheses will be tested, and we can understand whether the managerial factors would influence internal operational ones, which further affect maritime cybersecurity performance. A number of fit indices are used to test the fitness of the model; see . We utilise the SEM and perform the analysis using the AMOS 27 statistical package.

4. Research findings

4.1. Respondent profile

A total of valid 133 replies are collected. Most of the respondents are seafarers (84.2%), while the remaining 15.8% are onshore personnel working for various shipping companies. Regarding their work experience, around half of the participants have a considerable experience (more than 16 years) in the maritime industry (50.4%), followed by 11 to 15 years (22.6%), 6 to 10 years (21%) and less than 5 years (6%). These indicate that the respondents can provide valuable opinions on this topic as they have adequate and relevant experience.

4.2. Results of descriptive analysis

The results of the descriptive analysis are shown in . Overall, the identified six cybersecurity-related dimensions have a neutral to high agreement response with the overall cybersecurity readiness (mean between 3 and 4). The highest factor is ‘Procedures’ (mean: 3.94), followed by ‘Systems’ (mean: 3.90), ‘Monitoring’ (mean: 3.85), ‘Training and awareness’ (mean: 3.79), ‘Regulations’ (mean: 3.58), and ‘Human factor’ (mean: 3.36). Apart from the six dimensions, the overall cybersecurity performance of ships is currently high (mean: 4.26), which indicates that most of the respondents agree that shipping companies could have better performance through the above cybersecurity implementations. Among the identified items, four have mean values higher than 4, see items Pro3, Tra4, Sys2, and Sys3 in .

Table 1. Respondents’ perceptions of the critical dimensions and performance.

4.3. Results of CFA

CFA is conducted to verify the proposed structure, the results of which are presented in . Several statistical tests are used to determine how well the model fits the data; see for the metrics used and the fitness criteria. All metrics meet the recommended criteria.

Figure 2. CFA with standardised estimates.

Figure 2. CFA with standardised estimates.

Table 2. Results of CFA.

4.4. Reliability and validity tests

shows the results of the reliability and validity tests for the proposed model. The factor loadings λ for the variables are in the range between 0.56 and 0.9, more than the recommended value of 0.5, indicating a good relationship between the latent construct and the observed variables. It also confirms that the variance of the variables is sufficient for extraction by each dimension. The CR and AVE values are well above the recommended thresholds of 0.7 and 0.5 respectively (see Fornell and Larcker (Citation1981) for more), implying that the model meets the reliability and validity tests.

Table 3. Reliability and validity test results.

Table 4. Results of fitness tests.

4.5. Results of SEM

The SEM model with the standardised estimate results is shown in . The results of the model fitness parameters are presented in . Overall, the model meets the recommended criteria indicating a good fit.

Figure 3. SEM results with standardised estimates.

Figure 3. SEM results with standardised estimates.

shows the results of SEM. Based on a threshold p-value of 0.1, the results show that ‘Regulations’ has a positive and significant impact on company ‘Procedures’ (supporting H1); ‘Procedures’ also has a significant and positive impact on ‘Systems Readiness’, ‘Training and awareness’ and ‘Monitoring’ (supporting H2, H3 and H4, respectively). However, ‘Procedures’ does not have a significant and negative impact on the occurrence of ‘Human factor’ (H5 is not supported). Besides, ‘Training and awareness’ has a significant positive impact on ‘Performance’ (supporting H7). However, the results do not show a significant impact of ‘Monitoring’, ‘Systems’ and ‘Human factor’ on ‘Performance’ (not supporting H6, H8 and H9).

Table 5. Results of SEM.

5. Discussion

5.1. Current level of cyber preparedness in the maritime industry

Due to the growing widespread concern about cyber-crimes, in 2017, the IMO adopted Resolution MSC.428(98) ‘Maritime Cyber Risk Management in Safety Management Systems’ and issued ‘Guidelines on Maritime Cyber Risk Management’ (see IMO doc. MSC-FAL.1/Circ.3), to provide guidance on how to contact an assessment of cyber risk through the shipping company’s safety management system (CaproCaprolu et al. Citation2020). A company safety management system needs to appropriately address the cyber risks by taking into consideration the relevant standards and guidelines to ensure the safety of ships/crew and the protection of the marine environment (BIMCO, CLIA, ICS, Intercargo, Intermanager, Intertanko, IUMI, OCIMF and World Shipping Council Citation2020). Despite this general guidance, there is a lack of a clear description on how to develop such a safety management system in shipping companies for cybersecurity, in part because the causal relationship between key influential dimensions/factors and cybersecurity performance remains unclear. Shipping companies have therefore complied with the IMO cyber risk management requirements based on the best practice in the field, devised and implemented company-specific cyber procedures and policies for their ships. However, the issues on whether these procedures can adequately address the cybersecurity of onboard systems, maintenance of cyber-related equipment, training of their staff and compliance monitoring requirements still remain unclear. In addition, the procedures should be clear and easy to understand for the seafarers and staff, e.g., using flowcharts with concise descriptions to present the necessary activities to enhance maritime cybersecurity performance.

Shipboard systems with up-to-date anti-cyberattack designs are vital. For the mitigation of cyberattacks, onboard systems should be equipped with cybersecurity functions such as intelligent isolation and fast recovery, and also be regularly updated (Jones, Tam, and Papadaki Citation2016). For example, equipment such as ECDIS requires regular updates to ensure safe operation. These updates can be applied online or through a USB stick, both methods are prone to viruses.

Cybersecurity training is another key factor that affects cybersecurity performance. To enhance the cyber awareness and skills for mitigating cyber threats and thus enhancing the cybersecurity readiness, shipping companies need to conduct regular and up-to-date training in conjunction with sound cybersecurity solutions such as the use of antivirus software, spam filters, firewalls, enforcement of complex passwords, etc. Besides, behaviour-based training needs to be implemented for the staff to prevent intentional errors. To change the behaviour of both offshore staff and onboard crew, shipping companies need to do much more than annual training. A solution could be to foster a cybersecurity culture that includes an effective engagement with sound and robust cybersecurity best practices. A refresher training should also be carried out at regular intervals by shipping companies to cater for the dynamic environment, change in requirements, new personnel etc. (DNV-GL Citation2016).

Monitoring is also crucial to enhance ship’s cybersecurity performance. There is a need to put in place stringent monitoring requirements to ensure that industry recommendations, company policies and best practices are being adhered to at all times.

Meanwhile, some gaps in cybersecurity in the form of human factor still exist. Certain unsafe practices such as using personal devices and accessing suspicious websites are still prevalent in the industry; these can be exploited and infringed by criminals. This is in line with the findings reported in Alcaide and Llave (Citation2020). Respondents accepted the possibility of indulging in unsafe activities such as accessing suspicious websites/links, using personal devices on shipboard systems and sharing sensitive information via social media. Third-party removable media are also being used on shipboard systems without scanning them first, thereby, putting the ship’s systems at risk.

5.2. Impact of the cyber critical factors on cybersecurity performance

Regulations have a significant positive impact on procedures. Hence, shipping companies must strictly adhere to the regulatory framework for developing efficient cybersecurity policies, procedures and plans. Many regulations have been proposed by various organisations (see Section 2.2.1). Cyber security-related procedures have a significant positive effect on the resilience of onboard systems, training and awareness, and monitoring. Shipping should set stringent cybersecurity procedures, which provide guidelines for seafarers on shipboard systems operations and for the requirements of shipboard systems in cyber protection such as applying web and email content filtering.

Training and awareness have a significant positive impact on cybersecurity performance. Therefore, organisations must identify and address specific cyber training requirements for their staff and ensure that this is performed timely and upgraded at regular intervals. The training should also be provided regularly (e.g., every year or every half year) to staff and seafarers. Shipping companies could provide industrial case studies and best practices and collaborate with maritime universities, which in turn could provide high-standard cyber training courses to students, new seafarers and shipping company staff, and thus raise higher cybersecurity awareness related, for example, to phishing emails and websites, and encourage using strong passwords and changing them regularly. Government or maritime related associations could also recommend, mandate or provide cybersecurity training courses with recognised certificates to motivate more seafarers and staff to take the training.

5.3. Implications

The implications of this research are discussed from three aspects: managerial, academic and policy recommendations.

For managerial implications, this research addresses how shipping companies and seafarers can benefit in a more cost-effective way since the most influencing factors have been identified to guide and prioritise the measures to improve cybersecurity performance. Given that shipping companies often have limited budgets to address safety and cybersecurity concerns, this is especially the case also for small enterprises, our findings are insightful for them as they can guide these companies on how to obtain a satisfactory cybersecurity performance in a cost-effective manner. By ranking the crucial factors, companies can understand which factors are important and more efficient to improve their cybersecurity performance.

Regarding academic implications, SEM has been applied in many fields but there are limited applications related to cybersecurity. It shifts a new paradigm on the analysis of critical factors and performance in different maritime domains and even in a wider range of applied contexts such as those suffering high level of cybersecurity risks (e.g., finance and military). Further, the SEM based study presented in this paper also paves the way for further studies on the rational development of cybersecurity risk control measures. Future research can be extended in two directions: a) modelling of the relationships between risk factors/dimensions and the joint impact of multiple factors on cybersecurity performance; and b) modelling of cybersecurity risk-based decision making by incorporating our findings with economic information of the identified cybersecurity measures.

This paper also provides some policy recommendations to enhance the cybersecurity performance of the industry and to help more seafarers and staff understand the importance of cybersecurity as well as the skills required for dealing with cyberattacks. Through the collaboration among industry, government and academics, maritime cybersecurity performance can be significantly and efficiently enhanced.

6. Conclusions

This paper evaluates the interrelationship between six cybersecurity dimensions and the cybersecurity performance of ships. The results suggest that the shipping sector has had a positive outlook on the cyber regulatory framework and shipping companies have developed and implemented specific cyber procedures through their safety management system. These policies adequately cover critical areas of shipboard cybersecurity such as systems readiness, training and monitoring requirements. The results also show that cyber regulations positively impact the organisational procedures, which further positively and significantly impact the systems, training and awareness, and monitoring requirements. In addition, training and awareness is also found to have a positive impact on the overall cybersecurity performance of ships. Hence, to address cyber threats and the weak links in current cybersecurity practices, the maritime industry needs to improve cyber risk awareness among both onboard and shore-based staff by conducting regular and up-to-date training.

Unlike previous research, which mainly focused on identifying cyber weaknesses in the maritime industry, this research focuses on assessing the cybersecurity preparedness of ships and explaining the link of critical dimensions of cybersecurity to the overall preparedness and performance of ships. To our knowledge, this is among the first papers addressing these aspects of maritime cybersecurity and, thus, provides new research directions for academic research.

This paper has some research limitations which can be the focus of future research. First, the research framework is based on a literature review. Future research could further streamline the questionnaire and the theoretical framework, while incorporating other aspects such as user behaviour based on the so-called ‘protection motivation theory’, the ‘technology acceptance model’ and the ‘diffusion of innovations theory’. Secondly, future work can focus on collecting a larger sample from multinational seafarers to get a more representative opinion of the industry and potentially to focus on cultural behaviour differences. In addition, an analysis of the respondents’ opinions based on their background (e.g., experience, position, company size) can enhance our understanding of the respondents’ professional experience, e.g., related to the size of the technology on board the ships and the role of training the personnel involved in the operational processes. Finally, apart from the factors discussed in this work, there are various variables that can also affect the overall cybersecurity performance such as education, position, leadership, culture, and some human factors-related aspects such as fatigue, mental health issues, frustration, cognitive workload (for more details see Paul and Dykstra Citation2017; Zăgan et al. Citation2018; Tam et al. Citation2021; Telschow and Neider Citation2021). Future research could include these variables into the structure in order to obtain a more comprehensive picture.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

TThis work was partially supported by grants from the UK Economic and Social Research Council (ESRC) (ESRC-MOST UK-Taiwan Network Grant 2021) and the European Commission (H2020 European Research Council (ERC) Consolidator Grant TRUST, Grant agreement ID: 864724)

References

  • Alcaide, J. I., and R. G. Llave. 2020. “Critical Infrastructures Cybersecurity and the Maritime Sector.” Transportation Research Procedia 45: 547–554. doi:10.1016/j.trpro.2020.03.058.
  • American Bureau of Shipping. 2016. “The Application of Cybersecurity Principles to Marine and Offshore Operations”. Accessed 10th November 2021. https://ww2.eagle.org/content/dam/eagle/rules-and-guides/current/other/250_cybersafetyV1/CyberSafety_V1_Cybersecurity_GN_e.pdf
  • Belmont, K. 2014. “Maritime Cybersecurity: A Growing Threat Goes Unanswered.” Accessed 10 May 2021 http://cybersecuritylawwatch.com/
  • BIMCO, CLIA, ICS, Intercargo, Intermanager, Intertanko, IUMI, OCIMF and World Shipping Council. 2020. “The Guidelines on Cyber Security Onboard Ships (Version 4)”. Accessed 04 May 2021 https://www.bimco.org/about-us-and-our-members/publications/the-guidelines-on-cyber-security-onboard-ships
  • Bolat, P., and G. Kayisoglu. 2019. “Antecedents and Consequences of Cybersecurity Awareness: A Case Study for Turkish Maritime Sector.” Journal of ETA Maritime Science 7 (4): 344–360. doi:10.5505/jems.2019.85057.
  • Boyce, M. W., K. M. Duma, L. J. Hettinger, T. B. Malone, D. P. Wilson, and J. Lockett-Reynolds. 2011. “Human Performance in Cybersecurity: A Research Agenda.” Proceedings of the Human Factors and Ergonomics Society Annual Meeting. 55 (1): 1115–1119. Sage CA: Los Angeles, CA: SAGE Publications. 10.1177/1071181311551233.
  • Boyes, H., and R. Isbell. 2017. Code of Practice, Cyber Security for Ships. London: Institution of Engineering and Technology.
  • Caprolu, M., R. Di Pietro, S. Raponi, S. Sciancalepore, and P. Tedeschi. 2020. “Vessels Cybersecurity: Issues, Challenges, and the Road Ahead.” IEEE Communications Magazine 58 (6): 90–96. doi:10.1109/MCOM.001.1900632.
  • Chang, C. H., C. Kontovas, Q. Yu, and Z. Yang. 2021. “Risk Assessment of the Operations of Maritime Autonomous Surface Ships.” Reliability Engineering & System Safety 207: 107324. doi:10.1016/j.ress.2020.107324.
  • Chang, C. H., C. S. Lu, and P. L. Lai. 2021. “Examining the Drivers of Competitive Advantage of the International Logistics Industry.” International Journal of Logistics Research and Applications 1–19. doi:10.1080/13675567.2021.1915263.
  • Chang, C. H., W. Shi, W. Zhang, C. Park, and C. Kontovas 2019. “Evaluating Cybersecurity Risks in the Maritime Industry: A Literature Review.” Paper presented at the International Association of Maritime Universities (IAMU) Conference, Tokyo, October - 01st November 29th October - 01st.
  • Chang, C. H., W. Zhang, W. Shi, and C. Park 2020. “Evaluating Cybersecurity in the Maritime Industry.” Paper presented at the 10th Asian Logistics Round Table (ALRT) 2020 Conference, Tasmania, 19-20 November.
  • Cybersecurity Ventures. 2020. “Cybercrime to Cost the World $10.5 Trillion Annually by 2025.” Accessed 03 May 2021 https://cybersecurityventures.com/hackerpocalypse-cybercrime-report-2016/
  • DNV-GL. 2016. “Cyber Security Resilience Management for Ships and Mobile Offshore Units in Operation”, DNVGL-RP-0496.” Accessed 21 May 2021 https://www.gard.no/Content/21865536/DNVGL-RP-0496.pdf
  • El-Bably, A. Y. 2021. “Overview of the Impact of Human Error on Cybersecurity Based on ISO/IEC 27001 Information Security Management.” Journal of Information Security and Cybercrimes Research 4 (1): 95–102. doi:10.26735/WLPW6121.
  • Fornell, C., and D. F. Larcker. 1981. “Evaluating Structural Equation Models with Unobservable Variables and Measurement Error.” Journal of Marketing Research 18 (1): 39–50. doi:10.1177/002224378101800104.
  • Garcia-Perez, A., M. P. Sallos, and P. Tiwasing. 2021. “Dimensions of Cybersecurity Performance and Crisis Response in Critical Infrastructure Organisations: An Intellectual Capital Perspective.” Journal of Intellectual Capital. doi:10.1108/JIC-06-2021-0166.
  • Heij, C., and S. Knapp. 2018. “Predictive Power of Inspection Outcomes for Future Shipping accidents–an Empirical Appraisal with Special Attention for Human Factor Aspects.” Maritime Policy & Management 45 (5): 604–621. doi:10.1080/03088839.2018.1440441.
  • Hopcraft, R., and K. M. Martin. 2018. “Effective Maritime Cybersecurity regulation–the Case for a Cyber Code.” Journal of the Indian Ocean Region 14 (3): 354–366. doi:10.1080/19480881.2018.1519056.
  • IBM. 2014. “IBM Security Services 2014 Cyber Security Intelligence Index.” Accessed 25 October 2021. https://i.crn.com/sites/default/files/ckfinderimages/userfiles/images/crn/custom/IBMSecurityServices2014.PDF
  • IHS Fairplay. 2016. “Cyber security survey in association with BIMCO.” Accessed May 15 May 2021. https://cybersail.org/wp-content/uploads/2017/02/IHS-BIMCO-Survey-Findings.pdf
  • IMO. 2017. “Maritime Cyber Risk Management in Safety Management Systems.” Accessed 28 October 2021. https://wwwcdn.imo.org/localresources/en/OurWork/Security/Documents/Resolution%20MSC.428(98).pdf
  • Jones, K. D., K. Tam, and M. Papadaki. 2016. “Threats and Impacts in Maritime Cyber Security.” Engineering and Technology Reference 1 (5): 1–13. doi:10.1049/etr.2015.0123.
  • Kala, N., and M. Balakrishnan. 2019. “Cyber Preparedness in Maritime Industry.” International Journal of Scientific and Technical Advancements 5: 19–28.
  • Kao, L. H., M. Stewart, and K. H. Lee. 2009. “Using Structural Equation Modeling to Predict Cabin Safety Outcomes among Taiwanese Airlines.” Transportation Research Part E: Logistics and Transportation Review 45 (2): 357–365. doi:10.1016/j.tre.2008.09.007.
  • Kline, R. B. 2016. Principles and Practice of Structural Equation Modeling. 4th. New York: The Guilford Press.
  • Kuhn, K., S. Bicakci, and S. A. Shaikh. 2021. “COVID-19 Digitization in Maritime: Understanding Cyber Risks.” WMU Journal of Maritime Affairs 20 (2): 193–214. doi:10.1007/s13437-021-00235-1.
  • Lee, I. 2021. “Cybersecurity: Risk Management Framework and Investment Cost Analysis.” Business Horizons 64 (5): 659–671. doi:10.1016/j.bushor.2021.02.022.
  • Lin, C. C., and C. H. Chang. 2021. “Evaluating Employee’s Perception toward the Promotion of Safety Marketing at Ports.” International Journal of Shipping and Transport Logistics 13 (3–4): 275–299. doi:10.1504/IJSTL.2021.113985.
  • Lloyd’s Register. 2016. “LR Issues Technical Guidance for Ship Design in a Digital Age.” Accessed 20 May 2021 https://www.lr.org/en/latest-news/cyber-shipping-lr-issues-technical-guidance-for-ship-design-in-a-digital-age/
  • Lu, C. S., K. C. Shang, and C. C. Lin. 2016. “Examining Sustainability Performance at Ports: Port Managers’ Perspectives on Developing Sustainable Supply Chains.” Maritime Policy & Management 43 (8): 909–927. doi:10.1080/03088839.2016.1199918.
  • Lu, C. S., H. K. Weng, S. Y. Chen, C. W. Chiu, H. Y. Ma, K. W. Mak, and T. C. Yeung. 2020. “How Port Aesthetics Affect Destination Image, Tourist Satisfaction and Tourist Loyalty?” Maritime Business Review 5 (2): 211–228. doi:10.1108/MABR-12-2019-0056.
  • Macrae, C. 2009. “Human Factors at Sea: Common Patterns of Error in Groundings and Collisions.” Maritime Policy & Management 36 (1): 21–38. doi:10.1080/03088830802652262.
  • Min, S., K. K. F. So, and M. Jeong. 2019. “Consumer Adoption of the Uber Mobile Application: Insights from Diffusion of Innovation Theory and Technology Acceptance Model.” Journal of Travel & Tourism Marketing 36 (7): 770–783. doi:10.1080/10548408.2018.1507866.
  • Miron, W., and K. Muita. 2014. “Cybersecurity Capability Maturity Models for Providers of Critical Infrastructure.” Technology Innovation Management Review 4 (10): 33–39. doi:10.22215/timreview/837.
  • Nordhoff, S., V. Malmsten, B. van Arem, P. Liu, and R. Happee. 2021. “A Structural Equation Modeling Approach for the Acceptance of Driverless Automated Shuttles Based on Constructs from the Unified Theory of Acceptance and Use of Technology and the Diffusion of Innovation Theory.” Transportation Research Part F: Traffic Psychology and Behaviour 78: 58–73. doi:10.1016/j.trf.2021.01.001.
  • Pandey, S., R. K. Singh, A. Gunasekaran, and A. Kaushik. 2020. “Cyber Security Risks in Globalized Supply Chains: Conceptual Framework.” Journal of Global Operations and Strategic Sourcing 13 (1): 103–128. doi:10.1108/JGOSS-05-2019-0042.
  • Paul, C. L., and J. Dykstra. 2017. “Understanding Operator Fatigue, Frustration, and Cognitive Workload in Tactical Cybersecurity Operations.” Journal of Information Warfare 16 (2): 1–11.
  • Rogers, E. M. 1995. Diffusion of Innovations. 4th ed. New York: Free Press.
  • Sakar, C., B. Koseoglu, M. Buber, and A. C. Toz 2019. “Are the Ships Fully Secured against the cyber-attacks?” In Global Conference on Innovation in Marine Technology and the Future of Maritime Transportation 18th-19th of April 2019 İzmir, 276–288.
  • Sartipi, F. 2020. “Diffusion of Innovation Theory in the Realm of Environmental Construction.” Journal of Construction Materials 1 (4): 2–4. doi:10.36756/JCM.v1.3.2.
  • Svilicic, B., J. Kamahara, M. Rooks, and Y. Yano. 2019. “Maritime Cyber Risk Management: An Experimental Ship Assessment.” The Journal of Navigation 72 (5): 1108–1120. doi:10.1017/S0373463318001157.
  • Tam, K., R. Hopcraft, T. Crichton, and K. Jones. 2021. “The Potential Mental Health Effects of Remote Control in an Autonomous Maritime World.” Journal of International Maritime Safety, Environmental Affairs, and Shipping 5 (2): 40–55. doi:10.1080/25725084.2021.1922148.
  • Tam, K., and K. D. Jones. 2018. “Maritime Cybersecurity Policy: The Scope and Impact of Evolving Technology on International Shipping.” Journal of Cyber Policy 3 (2): 147–164. doi:10.1080/23738871.2018.1513053.
  • Tam, K., and K. Jones. 2019. “Situational Awareness: Examining Factors that Affect cyber-risks in the Maritime Sector.” International Journal on Cyber Situational Awareness 4 (1): 1–29. doi:10.22619/IJCSA.2019.100125.
  • Tam, K., K. Moara-Nkwe, and K. Jones. 2020. “The Use of Cyber Ranges in the Maritime Context: Assessing maritime-cyber Risks, Raising Awareness, and Providing Training.” Maritime Technology and Research 3 (1): 16–30. doi:10.33175/mtr.2021.241410.
  • Telschow, G., and M. Neider. 2021. “Cybersecurity and Fatigue: Does Fatigue from Visual Contrast Impact Our Ability to Correctly Classify Emails?” Journal of Vision 21 (9): 2111. doi:10.1167/jov.21.9.2111.
  • Wang, Y., M. Douglas, and B. Hazen. 2021. “Diffusion of Public Bicycle Systems: Investigating Influences of Users’ Perceived Risk and Switching Intention.” Transportation Research Part A: Policy and Practice 143: 1–13. doi:10.1016/j.tra.2020.11.002.
  • Whitteker, W. (2016). Leading Effective Cybersecurity with the Critical Security Controls. Retrieved from: https://www.sans.org/readingroom/whitepapers/critical/leading-effective-cybersecurity-critical-securitycontrols-36797
  • Wingrove, M. 2021. “Going beyond Compliance for Effective Cyber Security.” Accessed 03 June 2021 https://www.rivieramm.com/news-content-hub/news-content-hub/shipping-should-look-beyond-compliance-for-effective-cyber-security-64394 []
  • Yang, Z., Z. Yang, J. Yin, and Z. Qu. 2018. “A risk-based Game Model for Rational Inspections in Port State Control.” Transportation Research Part E: Logistics and Transportation Review 118: 477–495. doi:10.1016/j.tre.2018.08.001.
  • Zăgan, R., G. Raicu, R. Hanzu-Pazara, and S. Enache. 2018. “Realities in Maritime Domain regarding Cyber Security Concept.” Advanced Engineering Forum 27: 221–228. Trans Tech Publications Ltd. https://doi.org/10.4028/www.scientific.net/AEF.27.221.