279
Experience,ʺ 2022, doi:
https://doi.org/10.54941/ahfe1002205.
[8]InternationalMaritime Organization.ʺMaritime Safety.ʺ
IMO.
https://www.imo.org/en/OurWork/Safety/Pages/default.
aspx(accessed20February,2023).
[9]InternationalMaritimeOrganization,Internationalsafety
management code: with guidelines for its
implementation, 2018 edition.; Fifth edition. ed. (ISM‐
Code). London: International Maritime Organization,
2018.
[10]International Maritime Organization, SOLAS,
Consolidated Edition, 2020 (SOLAS).
London:
InternationalMaritimeOrganization,2020.
[11]InternationalMaritimeOrganization.ʺTheInternational
Safety Management (ISM) Code.ʺ IMO.
https://www.imo.org/en/ourwork/humanelement/pages/
ISMCode.aspx(accessed23February,2023).
[12]InternationalChamberofShipping,Bridge Procedures
Guide.Marisec,2022.
[13]ISO/IEC27000:2018Informationtechnology—Security
techniques—Informationsecuritymanagementsystems
— Overview and vocabulary, ISO, iso.org,
2020.
[Online]. Available:
https://www.iso.org/standard/73906.html
[14]ISO/IEC27001:2017Informationsecurity,cybersecurity
and privacy protection — Information security
management systems — Requirements, ISO, iso.org,
2017. [Online]. Available:
https://www.iso.org/standard/82875.html
[15]ISO/IEC27002:2022Informationsecurity,cybersecurity
andprivacyprotection—Informationsecuritycontrols,
ISO, iso.org, 2022. [Online]. Available:
https://www.iso.org/standard/75652.html
[16]Directive (EU) 2016/1148 European
Union Parliament,
Official Journal ofthe European Union, 2016. [Online].
Available: https://eur‐lex.europa.eu/legal‐
content/EN/TXT/PDF/?uri=CELEX:32016L1148&from=E
N
[17]DIRECTIVE (EU) 2022/2555, European Union
Parliament, Official Journal of the European Union,
2022.[Online].Available:https://eur‐lex.europa.eu/legal‐
content/EN/TXT/PDF/?uri=CELEX:32022L2555&qid=167
7163438395&from=en
[18]Framework for improving critical infrastructure
cybersecurity, N. I. o. S. a. T. NIST, 2018. [Online].
Available:
https://www.nist.gov/cyberframework/framework
[19]ENISA,ʺANALYSIS OF CYBER SECURITY ASPECTS
IN THE MARITIME SECTOR,ʺ
https://www.enisa.europa.eu/publications/cyber‐
security‐aspects‐in‐the‐maritime‐sector‐1,2011.[Online].
Available:
https://www.enisa.europa.eu/publications/cyber‐
security‐aspects‐in‐the‐maritime‐sector‐1
[20]Cyber security resilience management for ships and
mobile offshore units in operation, DNV,
standards.dnv.com, 2016. [Online]. Available:
https://standards.dnv.com/explorer/document/0ED73B3
209DA42CDA6392BC3946585C9/4
[21]Rec166‐RecommendationonCyberResilience,IACS,
2020. [Online]. Available:
http://www.iacs.org.uk/publications/recommendations/1
61‐180/
[22]The Guidelines on Cyber Security onboard Ships
Version 1.0, BIMCO, 2016. [Online]. Available:
https://www.bimco.org/about‐us‐and‐our‐
members/publications/the‐guidelines‐on‐cyber‐security‐
onboard‐ships
[23]ISO23806:2022Shipsandmarinetechnology—Cyber
safety, ISO, iso.org,
2022. [Online]. Available:
https://www.iso.org/standard/77027.html
[24]Vessel Cyber Risk Management Work Instruction,
United States Coast Guard, https://www.dco.uscg.mil/,
2020. [Online]. Available:
https://www.dco.uscg.mil/Our‐Organization/Assistant‐
Commandant‐for‐Prevention‐Policy‐CG‐5P/Inspections‐
Compliance‐CG‐5PC‐/Commercial‐Vessel‐
Compliance/CVCmms/
[25]IACS UR E26 Cyber resilience of ships, IACS,
https://iacs.org.uk/, 2022. [Online]. Available:
https://iacs.org.uk/news/iacs‐adopts‐new‐requirements‐
on‐cyber‐safety/
[26]IACS UR E27 Cyber resilience of ships equipment,
IACS, https://iacs.org.uk/, 2022. [Online]. Available:
https://iacs.org.uk/news/iacs‐adopts‐new‐requirements‐
on‐cyber‐safety/
[27]T.‐r.Qin,W.‐j.Chen,andX.‐k.Zeng,ʺRiskmanagement
modelinganditsapplicationinmaritimesafety,ʺJournal
ofMarineScienceandApplication,vol.
7,no.4,pp.286‐
291,2008.
[28]ISO 5807:1985 Information processing —
Documentation symbols and conventions for data,
program and system flowcharts, program network
charts and system resources charts, ISO, iso.org, 1985.
[Online]. Available:
https://www.iso.org/standard/11955.html
[29]M.Raimondi,G.Longo,A.Merlo,A.Armando,andE.
Russo,ʺTrainingthe
maritimesecurityoperationscentre
teams,ʺin2022IEEEInternationalConferenceonCyber
Security and Resilience (CSR), 2022: IEEE, pp. 388‐393,
doi:https://doi.org/10.1109/csr54599.2022.9850324.
[30]P.Greig,A.Maloney,andH.Higham,ʺEmergenciesin
general practice: could checklists support teams in
stressfulsituations?,ʺ(ineng),BrJGenPract,vol.70,no.
695,pp.304‐305,Jun2020,doi:10.3399/bjgp20X709373.
[31]D. L. Hepner et al.,ʺOperating room crisis checklists
and emergency manuals,ʺ Anesthesiology, vol. 127, no.
2,pp.384‐392,2017.
[32]BIMCO, International Chamber of Shipping, and
Witherby Publishing Group,Cyber Security Workbook
for On Board ShipUse‐4th Edition,
2023. Livingston:
WitherbyPublishingGroup,2023.
[33]F.S.Foundation.ʺFSFALARBriefingNote1.5,Normal
Checklists.ʺ SKYbrary Aviation Safety.
https://skybrary.aero/bookshelf/fsf‐alar‐briefing‐note‐15‐
normal‐checklists(accessed21February,2023).
[34]G. Di Stefano, F. Gino, G. Pisano, and B. R. Staats,
ʺLearning by Thinking: How Reflection Can Spur
Progress Along the Learning Curve,ʺ Management
Science, Harvard Business School NOM Unit Working
Paper No. 14‐093, 2014, doi:
https://dx.doi.org/10.2139/ssrn.2414478.
[35]A. Nganga, M. Lützhöft, J. Scanlan, and S. Mallam,
ʺTimely Maritime Cyber Threat Resolution in a Multi‐
StakeholderEnvironment,ʺ2022.
[36]G. Stoker, J. Greer, U. Clark, and C.
Chiego,
ʺConsideringMaritimeCybersecurityataNon‐Maritime
Education and Training Institution,ʺ in Proceedings of
theEDSIGConferenceISSN,2022,vol.2473,p.4901.
[37]E.Erstad,R.Ostnes,andM.S.Lund,ʺAnOperational
ApproachtoMaritimeCyberResilience,ʺTransNav,the
International Journal onMarine Navigation andSafety
of
SeaTransportation,vol.15,no.1,pp.27‐34,2021,doi:
https://doi.org/10.12716/1001.15.01.01.