{"id":"https://openalex.org/W2986219250","doi":"https://doi.org/10.1109/cybersa.2019.8899642","title":"Forensic Readiness within the Maritime Sector","display_name":"Forensic Readiness within the Maritime Sector","publication_year":2019,"publication_date":"2019-06-01","ids":{"openalex":"https://openalex.org/W2986219250","doi":"https://doi.org/10.1109/cybersa.2019.8899642","mag":"2986219250"},"language":"en","primary_location":{"id":"doi:10.1109/cybersa.2019.8899642","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2019.8899642","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085657440","display_name":"Kimberly Tam","orcid":null},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Kimberly Tam","raw_affiliation_strings":["University of Plymouth"],"affiliations":[{"raw_affiliation_string":"University of Plymouth","institution_ids":["https://openalex.org/I897542642"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043312142","display_name":"Kevin Jones","orcid":"https://orcid.org/0000-0002-7960-0978"},"institutions":[{"id":"https://openalex.org/I897542642","display_name":"University of Plymouth","ror":"https://ror.org/008n7pv89","country_code":"GB","type":"education","lineage":["https://openalex.org/I897542642"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Kevin Jones","raw_affiliation_strings":["University of Plymouth"],"affiliations":[{"raw_affiliation_string":"University of Plymouth","institution_ids":["https://openalex.org/I897542642"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5085657440"],"corresponding_institution_ids":["https://openalex.org/I897542642"],"apc_list":null,"apc_paid":null,"fwci":1.4482,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.85830839,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12985","display_name":"Maritime Security and History","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/3313","display_name":"Transportation"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},"topics":[{"id":"https://openalex.org/T12985","display_name":"Maritime Security and History","score":0.9886999726295471,"subfield":{"id":"https://openalex.org/subfields/3313","display_name":"Transportation"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11622","display_name":"Maritime Navigation and Safety","score":0.9860000014305115,"subfield":{"id":"https://openalex.org/subfields/2212","display_name":"Ocean Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12888","display_name":"Military Strategy and Technology","score":0.9782999753952026,"subfield":{"id":"https://openalex.org/subfields/2207","display_name":"Control and Systems Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.6666004061698914},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.5630189776420593},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.5615935921669006},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.5185021162033081},{"id":"https://openalex.org/keywords/quality","display_name":"Quality (philosophy)","score":0.4658210277557373},{"id":"https://openalex.org/keywords/digital-evidence","display_name":"Digital evidence","score":0.45403429865837097},{"id":"https://openalex.org/keywords/risk-analysis","display_name":"Risk analysis (engineering)","score":0.4411754310131073},{"id":"https://openalex.org/keywords/component","display_name":"Component (thermodynamics)","score":0.4301111102104187},{"id":"https://openalex.org/keywords/information-security","display_name":"Information security","score":0.4174303412437439},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.41427528858184814},{"id":"https://openalex.org/keywords/process-management","display_name":"Process management","score":0.3409196138381958},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.29037684202194214}],"concepts":[{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.6666004061698914},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.5630189776420593},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5615935921669006},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.5185021162033081},{"id":"https://openalex.org/C2779530757","wikidata":"https://www.wikidata.org/wiki/Q1207505","display_name":"Quality (philosophy)","level":2,"score":0.4658210277557373},{"id":"https://openalex.org/C2781357168","wikidata":"https://www.wikidata.org/wiki/Q5276084","display_name":"Digital evidence","level":3,"score":0.45403429865837097},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.4411754310131073},{"id":"https://openalex.org/C168167062","wikidata":"https://www.wikidata.org/wiki/Q1117970","display_name":"Component (thermodynamics)","level":2,"score":0.4301111102104187},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.4174303412437439},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.41427528858184814},{"id":"https://openalex.org/C195094911","wikidata":"https://www.wikidata.org/wiki/Q14167904","display_name":"Process management","level":1,"score":0.3409196138381958},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.29037684202194214},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C97355855","wikidata":"https://www.wikidata.org/wiki/Q11473","display_name":"Thermodynamics","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/cybersa.2019.8899642","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cybersa.2019.8899642","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2019 International Conference on Cyber Situational Awareness, Data Analytics And Assessment (Cyber SA)","raw_type":"proceedings-article"},{"id":"pmh:oai:pearl.plymouth.ac.uk:10026.1/14473","is_oa":false,"landing_page_url":"http://hdl.handle.net/10026.1/14473","pdf_url":null,"source":{"id":"https://openalex.org/S4306402507","display_name":"PEARL (University of Plymouth)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I897542642","host_organization_name":"University of Plymouth","host_organization_lineage":["https://openalex.org/I897542642"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Book"},{"id":"pmh:oai:pearl.plymouth.ac.uk:10026.1/16063","is_oa":false,"landing_page_url":"http://hdl.handle.net/10026.1/16063","pdf_url":null,"source":{"id":"https://openalex.org/S4306402507","display_name":"PEARL (University of Plymouth)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I897542642","host_organization_name":"University of Plymouth","host_organization_lineage":["https://openalex.org/I897542642"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"conference"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W147350318","https://openalex.org/W185406290","https://openalex.org/W1534992827","https://openalex.org/W2131060714","https://openalex.org/W2149713648","https://openalex.org/W2344898410","https://openalex.org/W2369295637","https://openalex.org/W2584794099","https://openalex.org/W2619874920","https://openalex.org/W2797855251","https://openalex.org/W2888802408","https://openalex.org/W2911123865","https://openalex.org/W2937869572","https://openalex.org/W3165775894","https://openalex.org/W6605968968","https://openalex.org/W6607448945","https://openalex.org/W6704512472","https://openalex.org/W6733695352"],"related_works":["https://openalex.org/W5341801","https://openalex.org/W2548287415","https://openalex.org/W2598491911","https://openalex.org/W2181728705","https://openalex.org/W4288054526","https://openalex.org/W3122539278","https://openalex.org/W4247205791","https://openalex.org/W2611755027","https://openalex.org/W1604717907","https://openalex.org/W1567868449"],"abstract_inverted_index":{"Forensic":[0],"investigation":[1,104,114,144],"is":[2,14,33],"an":[3,58],"essential":[4],"response":[5],"strategy":[6],"following":[7],"a":[8,48,86,93],"cyber-related":[9],"incident,":[10],"and":[11,22,40,64,72,92,99,105,125,146],"forensic":[12,80,113],"readiness":[13,81,110],"the":[15,37,43,79,83,109,152],"capability":[16],"to":[17,68,101,122,142],"gather":[18],"critical":[19],"digital":[20,66],"information":[21],"maximize":[23],"its":[24,103],"use":[25],"as":[26],"evidence.":[27],"The":[28],"effectiveness":[29],"of":[30,42,82,89,96,111],"this":[31,129],"data":[32,44],"highly":[34],"dependent":[35],"on":[36],"readiness,":[38],"quality,":[39],"trustworthiness":[41],"itself.":[45],"Far":[46],"from":[47,62,139],"passive":[49],"post-analysis":[50],"tool,":[51],"there":[52],"have":[53],"been":[54,116],"many":[55],"instances":[56],"where":[57],"organization":[59],"has":[60,115],"benefited":[61],"gathering,":[63],"using,":[65],"evidence":[67],"improve":[69,147],"their":[70],"cyber-security":[71],"mitigate":[73],"future":[74],"incidents.":[75],"This":[76],"article":[77],"examines":[78],"maritime":[84,112,148,153],"sector,":[85],"core":[87],"component":[88],"global":[90],"trade":[91],"unique":[94],"combination":[95],"information/operational":[97],"technology":[98],"people,":[100],"understand":[102],"mitigation":[106],"capabilities.":[107],"Once":[108],"better":[117],"understood,":[118],"by":[119],"comparing":[120],"it":[121],"other":[123],"sectors":[124],"using":[126],"risk":[127],"scenarios,":[128],"paper":[130],"proposes":[131],"actions":[132],"toward":[133],"improvement.":[134],"These":[135],"steps":[136],"are":[137],"built":[138],"established":[140],"attempts":[141],"increase":[143],"capabilities":[145],"cyber-security,":[149],"but":[150],"address":[151],"sector":[154],"specifically.":[155]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
