dc.contributor.author | Pöyhönen, Jouni | |
dc.contributor.author | Lehto, Martti | |
dc.date.accessioned | 2023-11-08T11:38:51Z | |
dc.date.available | 2023-11-08T11:38:51Z | |
dc.date.issued | 2023 | |
dc.identifier.citation | Pöyhönen, J., & Lehto, M. (2023). Comprehensive cyber security for port and harbor ecosystems. <i>Frontiers in Computer Science</i>, <i>5</i>, Article 1154069. <a href="https://doi.org/10.3389/fcomp.2023.1154069" target="_blank">https://doi.org/10.3389/fcomp.2023.1154069</a> | |
dc.identifier.other | CONVID_194361681 | |
dc.identifier.uri | https://jyx.jyu.fi/handle/123456789/91823 | |
dc.description.abstract | Global maritime transportation and logistics systems are essential parts of critical infrastructures in every society, and a crucial part of maritime logistics processes are seaports. In the coming years, digitalization and increased levels of autonomy in logistic transport chains are expected to take leaps forward. This development can help create safer, more efficient, more sustainable, and more reliable service chains to meet the requirements for a better quality of life and global prosperity. Port and harbor operations connect the maritime transport to other modes of transportation and enable multimodal transportation. Smart ports play a central role in future transport logistics and supply chains. Digitalization helps improve the efficiency of terminal systems in the processes of these ports. In the best cases, digitalization can also promote the reduction of emissions by optimizing port operations and enhancing cargo and people flows while improving the experience for all stakeholders. The improvement of port processes relies on the development of information and communication technology (ICT) as well as on industrial control systems (ICS) and operation technologies (OT). At the same time, the cyber security of maritime logistics also needs to be addressed. This article presents our findings related to the Sea4Value research goal on cyber security, which is a comprehensive cyber security architecture for port services at the system level. The article emphasizes the importance of a system of systems approach in terms of a comprehensive cyber security management process for port ecosystems. The description and recognition of management steps of every stakeholder are the key elements in this kind of process. | en |
dc.format.mimetype | application/pdf | |
dc.language.iso | eng | |
dc.publisher | Frontiers Media | |
dc.relation.ispartofseries | Frontiers in Computer Science | |
dc.rights | CC BY 4.0 | |
dc.subject.other | maritime logistics | |
dc.subject.other | port ecosystem | |
dc.subject.other | comprehensive cyber security management | |
dc.subject.other | cyber threat intelligence | |
dc.subject.other | risk management process | |
dc.title | Comprehensive cyber security for port and harbor ecosystems | |
dc.type | article | |
dc.identifier.urn | URN:NBN:fi:jyu-202311087860 | |
dc.contributor.laitos | Informaatioteknologian tiedekunta | fi |
dc.contributor.laitos | Faculty of Information Technology | en |
dc.contributor.oppiaine | Tietojärjestelmätiede | fi |
dc.contributor.oppiaine | Tekniikka | fi |
dc.contributor.oppiaine | Information Systems Science | en |
dc.contributor.oppiaine | Engineering | en |
dc.type.uri | http://purl.org/eprint/type/JournalArticle | |
dc.type.coar | http://purl.org/coar/resource_type/c_2df8fbb1 | |
dc.description.reviewstatus | peerReviewed | |
dc.relation.issn | 2624-9898 | |
dc.relation.volume | 5 | |
dc.type.version | publishedVersion | |
dc.rights.copyright | © 2023 P¨oyh¨onen and Lehto. | |
dc.rights.accesslevel | openAccess | fi |
dc.subject.yso | infrastruktuurit | |
dc.subject.yso | satamat | |
dc.subject.yso | kyberturvallisuus | |
dc.subject.yso | logistiikka | |
dc.subject.yso | merenkulku | |
dc.subject.yso | merikuljetus | |
dc.subject.yso | riskienhallinta | |
dc.subject.yso | toimitusketjut | |
dc.subject.yso | verkkohyökkäykset | |
dc.format.content | fulltext | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p17539 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p11027 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p26189 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p9140 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2049 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p2047 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p3134 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p19415 | |
jyx.subject.uri | http://www.yso.fi/onto/yso/p27466 | |
dc.rights.url | https://creativecommons.org/licenses/by/4.0/ | |
dc.relation.doi | 10.3389/fcomp.2023.1154069 | |
dc.type.okm | A1 | |