559
[5]CISCO, (2023), Cybersecurity,
https://www.cisco.com/c/en/us/products/security/what‐
iscybersecurity.html[Accessed:10.02.2023].
[6]Comarch (2023), User Experience – projektowanie
pozytywnego doświadczenia,
https://www.comarch.pl/erp/blog/user‐experience‐
projektowanie‐pozytywnego‐doswiadczenia [Accessed:
20.01.2023].
[7]Czakon W. ed. (2020), Podstawy metodologii badan w
naukach o zarządzaniu, Wydawnictwo Nieoczywiste,
wyd.III,,119‐197.
[8]EC Digital Strategy,
(2023) https://digital‐
strategy.ec.europa.eu/en/policies/cybersecurity‐policies].
[Accessed:20.01.2023].
[9]EC DSA (2022), https://digital‐
strategy.ec.europa.eu/en/policies/digital‐services‐act‐
package[Accessed:02.02.2023].
[10]EC, Europe fir digital age (2023),
https://commission.europa.eu/strategy‐and‐
policy/priorities‐2019‐2024/europe‐fit‐digital‐age/digital‐
services‐act‐ensuring‐safe‐and‐accountable‐online‐
environment_en[Accessed:02.02.2023].
[11]ExpertSession‐K.Krużewska,(2023),DataProtection
Officer and Plenipotentiary of the Management Board
for Cybersecurity of PŻB Polferries, Transport Week
2023,Gdynia,Poland,14.03.2023
[12]Hess T (2016) Digitalisierung.In: Gronau N, Becker J,
Leimeister JM, Sinz E, Suhl L (eds): Enzyklopädie der
Wirtschaftsinformatik – Online‐Lexikon, Ninth edition.
GITO, Berlin. http:// www.enzyklopaedie‐der‐
wirtschaftsinformatik.de.
[Accessed20.03.2017].
[13]IBM (2023), Cybersecurity,
https://www.ibm.com/topics/cybersecurity[Accessed:
10.02.2023].
[14]Ichimura Y., DalaklisD., Kitada M., ChristodoulouA.
(2022),Shippingintheeraofdigitalization:
[15]IMO 46th FAL Session (2022),
https://www.imo.org/en/MediaCentre/MeetingSummari
es/Pages/FAL46th‐Session.aspx[Accessed:30.01.2023].
[16]IMO Compedium (2022), The IMO Compedium on
Facilitation and Electronic Business,
https://www.imo.org/en/OurWork/Facilitation/Pages/IM
OCompendium.aspx
[Accessed:02.02.2023].
[17]IMO FAL Conv. (2019),
https://www.imo.org/en/OurWork/Facilitation/Pages/Ele
ctronicBusiness‐default.aspx[Accessed:30.01.2023].
[18]IMOMSC‐FAL.1/Circ.3,(2017),Guidelinesonmaritime
cyber risk management,
https://wwwcdn.imo.org/localresources/en/OurWork/Se
curity/Documents/MSC‐FAL.1‐
Circ.3%20%20Guidelines%20On%20Maritime%20Cyber
%20Risk%20Management%20(Secretariat).pdf
[Accessed:07.02.2023].
[19]IMO Resolution MSC.428(98), (2017), Maritime Cyber
Risk Management in Safety Management Systems,
https://wwwcdn.imo.org/localresources/en/OurWork/Se
curity/Documents/Resolution%20MSC.428(98).pdf
[Accessed:10.02.2023].
[20]IMO, (2023),
https://www.imo.org/en/OurWork/Security/Pages/Cyber
‐security.aspx,[Accessed:15.01.2023].
[21]Information security management systems.
Requirements (2023), https://www.iso.org.pl/uslugi‐
zarzadzania/wdrazanie‐systemow/zarzadzanie‐
ryzykiem/iso‐iec‐27001,[Accessed:15.01.2023].
[22]International Electrotechnical Commission (2023)
[https://www.imo.org/en/OurWork/Security/Pages/Cybe
r‐security.aspx,[Accessed:15.01.2023].
[23]ISO (2010), ISO 9241‐210, 2010;
https://www.iso.org/standard/52075.html [Accessed:
20.01.2023].
[24]ITU (2021), ITU‐T E.800 09/2008,
https://www.itu.int/br_tsb_terms/#?q=cybersecurity&sec
tor=T,R&from=2005‐01‐01&to=2023‐03‐
12&status=2&type=any&page=1,
[Accessed:06.02.2023].
[25]KIEGiT(2015),KrajowaIzbaGospodarczaElektronikii
Telekomunikacji, Program Rozwoju Infrastruktury i
Przemysłu, http://kigeit.org.pl/FTP/PRCIP/2015‐04‐
15_PRCIP_ftp.pdf[Accessed:14.01.2023].
[26]Legner,T.Eymann,T.Hess,Ch.Matt,T.Böhmann,P.
Drews, A. Mädche, N. Urbach, F. Ahlemann (2017)
Digitalization: Opportunity and Challenge for the
Business and Information
Systems Engineering
CommunityBus,InfSystEng,DOI10.1007/s12599‐017‐
0484‐2.
[27]Li, L., Su, F., Zhang, W., Mao, J.Y. (2017) Digital
transformation by SME entrepreneurs: a capability
perspective,Inform.Syst.J.1–29.DOI:10.1111/isj.12153.
[28]Logistyka i Transport, Wydawnictwo Uniwersytetu
Ekonomicznegowe Wrocławiu,ISBN9788376958910,s.
86‐96.
[29]Mapping the future strategic plans of major maritime
commercial actors, Digital Business,
https://doi.org/10.1016/j.digbus.2022.100022 [Accessed:
10.01.2023].
[30]MInistry of Digitalization(2023), The State
Informatization Strategy ,
http://archiwum.mc.gov.pl/konsultacje/program‐
zintegrowanej‐informatyzacji‐panstwa/zalacznik‐1‐
strategia‐informatyzacji‐panstwa‐plan‐dzialan‐ministra‐
cyfryzacji].[Accessed:15.01.2023].
[31]Morakanyane R., Grace A., OʹReilly P. (2017),
ConceptualizingDigital
TransformationinBusiness
[32]NN Group (2023), The definition of user experience,
https://www.nngroup.com/articles/definition‐user‐
experience[Accessed:20.01.2023].
[33]Now!, Springer, https://doi.org/10.1007/978‐3‐319‐
72844‐5_2[Accessed:11.01.2023].
[34]OBP (2023), ISO/IEC 27032:2012,
https://www.iso.org/obp/ui/#iso:std:iso‐iec:27032:ed‐
1:v1:en[Accessed:04.02.2023].
[35]OECD, (2023), https://www.oecd.org/digital/digital‐
security/]. Przykładem są zalecenia OECD w sprawie
strategii
administracji cyfrowej (OECD
RecommendationonDigitalGovernmentStrategies
[36]OECD, (2023), https://www.oecd.org/gov/the‐oecd‐
digital‐government‐policy‐framework‐f64fed2a‐en.htm,
https://www.oecd.org/gov/digital‐
government/recommendation‐on‐digital‐government‐
strategies.htm,[Accessed:15.01.2023].
[37]Organizations:ASystematicReviewofLiterature,30th
Bled eConference Digital Transformation – From
ConnectingThingstoTransformingOurLivesAt:Bled,
Slovenia, http://dx.doi.org/10.18690/978‐
961‐286‐043‐1.30
[Accessed:14.01.2023].
[38]Paradowski D., (2010), Digitalizacja piśmiennictwa,
BibliotekaNarodowa,Warszawa,ISBN978‐83‐7009‐706‐
6,s.17.
[39]PECB (2023), SO/IEC 27032 Cyber Security Trainings,
https://pecb.com/en/education‐and‐certification‐for‐
individuals/iso‐iec‐27032,[Accessed:04.02.2023].
[40]Schallmo,DRA,Williams,Kalifornia(2018),Historyof
DigitalTransformation,
DigitalTransformation
[41]Service of the Republic of Poland, Cyfryzacja (2023),
https://www.gov.pl/web/cyfryzacja/jednolity‐rynek‐
cyfrowy,[Accessed:04.02.2023].
[42]Strategia (2019), Strategia Cyberbezpieczeństwa RP na
lata 2019‐2024,
https://www.dziennikustaw.gov.pl/D2018000156001.pdf
][Accessed:15.01.2023].
[43]Tilson D, Lyytinen K, Sørensen C (2010) Digital
infrastructures:themissingISresearchagenda.InfSyst
Res21(4):748–759.
[44]
Ustawa z dnia 5 lipca 2018 r. o krajowym systemie
cyberbezpieczeństwa (Dz. U. 1560),
https://www.dziennikustaw.gov.pl/D2018000156001.pdf
[Accessed:04.02.2023].
[45]Warsewicz M. (2021), Digitalizacja oraz transformacja
cyfrowa.Studiumprzypadku:PKNOrlenS.A.,