{"id":"https://openalex.org/W4390545561","doi":"https://doi.org/10.1007/s10207-023-00799-4","title":"A modular cyber security training programme for the maritime domain","display_name":"A modular cyber security training programme for the maritime domain","publication_year":2024,"publication_date":"2024-01-03","ids":{"openalex":"https://openalex.org/W4390545561","doi":"https://doi.org/10.1007/s10207-023-00799-4"},"language":"en","primary_location":{"id":"doi:10.1007/s10207-023-00799-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00799-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00799-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00799-4.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058971634","display_name":"Aybars Oru\u00e7","orcid":"https://orcid.org/0000-0002-3359-068X"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":true,"raw_author_name":"Aybars Oruc","raw_affiliation_strings":["Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, NTNU - Norwegian University of Science and Technology, Gj\u00f8vik, 2815, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, NTNU - Norwegian University of Science and Technology, Gj\u00f8vik, 2815, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5085263852","display_name":"Nabin Chowdhury","orcid":"https://orcid.org/0000-0003-3907-734X"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Nabin Chowdhury","raw_affiliation_strings":["Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, NTNU - Norwegian University of Science and Technology, Gj\u00f8vik, 2815, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, NTNU - Norwegian University of Science and Technology, Gj\u00f8vik, 2815, Norway","institution_ids":["https://openalex.org/I204778367"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5071334624","display_name":"Vasileios Gkioulos","orcid":"https://orcid.org/0000-0001-7304-3835"},"institutions":[{"id":"https://openalex.org/I204778367","display_name":"Norwegian University of Science and Technology","ror":"https://ror.org/05xg72x27","country_code":"NO","type":"education","lineage":["https://openalex.org/I204778367"]}],"countries":["NO"],"is_corresponding":false,"raw_author_name":"Vasileios Gkioulos","raw_affiliation_strings":["Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, NTNU - Norwegian University of Science and Technology, Gj\u00f8vik, 2815, Norway"],"affiliations":[{"raw_affiliation_string":"Department of Information Security and Communication Technology, Faculty of Information Technology and Electrical Engineering, NTNU - Norwegian University of Science and Technology, Gj\u00f8vik, 2815, Norway","institution_ids":["https://openalex.org/I204778367"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5058971634"],"corresponding_institution_ids":["https://openalex.org/I204778367"],"apc_list":{"value":2590,"currency":"EUR","value_usd":3190},"apc_paid":{"value":2590,"currency":"EUR","value_usd":3190},"fwci":14.659,"has_fulltext":false,"cited_by_count":19,"citation_normalized_percentile":{"value":0.98818355,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":"23","issue":"2","first_page":"1477","last_page":"1512"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9836000204086304,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12221","display_name":"Cybersecurity and Cyber Warfare Studies","score":0.9301000237464905,"subfield":{"id":"https://openalex.org/subfields/3320","display_name":"Political Science and International Relations"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11622","display_name":"Maritime Navigation and Safety","score":0.9065999984741211,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/delphi-method","display_name":"Delphi method","score":0.6113008260726929},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5146263837814331},{"id":"https://openalex.org/keywords/security-awareness","display_name":"Security awareness","score":0.5052197575569153},{"id":"https://openalex.org/keywords/training","display_name":"Training (meteorology)","score":0.5042308568954468},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.4354478120803833},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.40943199396133423},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.40875399112701416},{"id":"https://openalex.org/keywords/engineering-management","display_name":"Engineering management","score":0.37759020924568176},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.33197128772735596},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.22894850373268127}],"concepts":[{"id":"https://openalex.org/C60641444","wikidata":"https://www.wikidata.org/wiki/Q841602","display_name":"Delphi method","level":2,"score":0.6113008260726929},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5146263837814331},{"id":"https://openalex.org/C2778652015","wikidata":"https://www.wikidata.org/wiki/Q7445019","display_name":"Security awareness","level":3,"score":0.5052197575569153},{"id":"https://openalex.org/C2777211547","wikidata":"https://www.wikidata.org/wiki/Q17141490","display_name":"Training (meteorology)","level":2,"score":0.5042308568954468},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.4354478120803833},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.40943199396133423},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.40875399112701416},{"id":"https://openalex.org/C110354214","wikidata":"https://www.wikidata.org/wiki/Q6314146","display_name":"Engineering management","level":1,"score":0.37759020924568176},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.33197128772735596},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.22894850373268127},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C153294291","wikidata":"https://www.wikidata.org/wiki/Q25261","display_name":"Meteorology","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s10207-023-00799-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00799-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00799-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},{"id":"pmh:oai:ntnuopen.ntnu.no:11250/3118428","is_oa":true,"landing_page_url":"https://hdl.handle.net/11250/3118428","pdf_url":null,"source":{"id":"https://openalex.org/S4306401716","display_name":"Duo Research Archive (University of Oslo)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I184942183","host_organization_name":"University of Oslo","host_organization_lineage":["https://openalex.org/I184942183"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"International Journal of Information Security","raw_type":"info:eu-repo/semantics/article"}],"best_oa_location":{"id":"doi:10.1007/s10207-023-00799-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10207-023-00799-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10207-023-00799-4.pdf","source":{"id":"https://openalex.org/S164062316","display_name":"International Journal of Information Security","issn_l":"1615-5262","issn":["1615-5262","1615-5270"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Journal of Information Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4390545561.pdf"},"referenced_works_count":33,"referenced_works":["https://openalex.org/W614339571","https://openalex.org/W648350558","https://openalex.org/W1483229451","https://openalex.org/W1842135337","https://openalex.org/W1980523980","https://openalex.org/W2007594423","https://openalex.org/W2156895029","https://openalex.org/W2773977703","https://openalex.org/W2782586335","https://openalex.org/W2998423233","https://openalex.org/W3004014524","https://openalex.org/W3033973438","https://openalex.org/W3084776063","https://openalex.org/W3126811129","https://openalex.org/W3142755060","https://openalex.org/W3197059018","https://openalex.org/W3197830394","https://openalex.org/W3199997066","https://openalex.org/W3205477440","https://openalex.org/W3216968919","https://openalex.org/W4205129830","https://openalex.org/W4220904600","https://openalex.org/W4226185771","https://openalex.org/W4229666536","https://openalex.org/W4251482995","https://openalex.org/W4253757288","https://openalex.org/W4312478662","https://openalex.org/W4312629678","https://openalex.org/W4361230065","https://openalex.org/W4362731988","https://openalex.org/W4404437288","https://openalex.org/W6607414083","https://openalex.org/W7074212656"],"related_works":["https://openalex.org/W185442532","https://openalex.org/W2966027630","https://openalex.org/W2086515904","https://openalex.org/W4313261984","https://openalex.org/W4304943319","https://openalex.org/W2166222264","https://openalex.org/W2544387082","https://openalex.org/W2968709340","https://openalex.org/W2099222119","https://openalex.org/W2888935944"],"abstract_inverted_index":{"Abstract":[0],"The":[1,212],"global":[2],"maritime":[3,109,130,145,228],"industry":[4],"is":[5,35,63,97],"continuing":[6],"the":[7,27,60,67,116,125,144,161,166,170,202],"rapid":[8],"digitization":[9],"of":[10,26,43,66,71,77,81,91,127,172,207],"systems":[11],"and":[12,88,177,189,205,224],"dependency":[13],"on":[14],"advancing":[15],"technology,":[16],"in":[17,100,122,192],"a":[18,40,137],"trend":[19],"akin":[20],"to":[21,39,53,57,108,200],"other":[22],"industrial":[23],"domains.":[24],"One":[25],"main":[28,68],"issues":[29],"that":[30],"this":[31,133,180],"integration":[32],"has":[33],"brought":[34],"an":[36],"increased":[37],"vulnerability":[38],"growing":[41],"number":[42],"cyber":[44,58,73,85,104,139,184,210,229],"threats.":[45],"While":[46],"several":[47],"security":[48,86,105,140,185,230],"measures":[49],"are":[50],"being":[51],"implemented":[52,217],"prevent":[54],"or":[55],"respond":[56],"attacks,":[59],"human":[61,78],"element":[62],"still":[64,98],"one":[65],"weaknesses.":[69],"Many":[70],"today\u2019s":[72],"attacks":[74],"take":[75],"advantage":[76],"personnel\u2019s":[79],"lack":[80],"awareness,":[82],"which":[83],"makes":[84],"awareness":[87],"training":[89,106,113,141,186,222,231],"activities":[90],"critical":[92],"importance.":[93],"Unfortunately,":[94],"current":[95],"research":[96],"limited":[99],"its":[101],"offerings":[102],"for":[103,115,143,187,227],"specific":[107],"personnel.":[110],"Moreover,":[111],"such":[112],"programmes":[114],"professionals":[117],"should":[118],"be":[119,216],"developed":[120,136],"role-based":[121],"accordance":[123],"with":[124,169],"suggestions":[126],"many":[128],"credited":[129],"organizations.":[131],"For":[132],"reason,":[134],"we":[135,159,182],"modular":[138],"programme":[142,163,214],"domain":[146],"called":[147],"Maritime":[148],"Cyber":[149],"Security":[150],"(MarCy)":[151],"by":[152,164,218],"implementing":[153],"Critical":[154],"Events":[155],"Model":[156],"(CEM).":[157],"Then,":[158],"evaluated":[160],"MarCy":[162,213],"utilizing":[165],"Delphi":[167],"technique":[168],"participation":[171],"19":[173],"experts":[174],"from":[175],"academia":[176],"industry.":[178],"In":[179],"study,":[181],"offer":[183],"seafarers":[188],"office":[190],"employees":[191],"shipping":[193,220],"companies.":[194],"We":[195],"proposed":[196],"eleven":[197],"elective":[198],"modules":[199],"improve":[201],"knowledge,":[203],"skills,":[204],"attitude":[206],"learners":[208],"against":[209],"risks.":[211],"can":[215],"universities,":[219],"companies,":[221],"institutes,":[223],"governmental":[225],"organizations":[226],"purposes.":[232]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":7}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
