Hostname: page-component-cd9895bd7-jkksz Total loading time: 0 Render date: 2024-12-25T13:14:59.238Z Has data issue: false hasContentIssue false

Evaluating SLIM-based human error probability for ECDIS cybersecurity in maritime

Published online by Cambridge University Press:  05 October 2022

Gizem Kayisoglu*
Affiliation:
Department of Maritime Transportation Management Engineering, Istanbul Technical University Maritime Faculty, Istanbul, Turkey
Pelin Bolat
Affiliation:
Department of Basic Sciences, Istanbul Technical University Maritime Faculty, Istanbul, Turkey
Kimberly Tam
Affiliation:
School of Engineering, Computing, and Mathematics, University of Plymouth, Plymouth, UK
*
*Corresponding author. E-mail: [email protected]
Rights & Permissions [Opens in a new window]

Abstract

There is an undeniable recognition that maritime cybersecurity risk management should involve process, technology, and people. However, thus far, most studies have focused on the technical and process aspects of maritime cybersecurity, more than on the human element. On a vessel, the Electronic Chart Display and Information System (ECDIS) is, amongst all the electronic devices on the bridge, a complex and indispensable maritime sociotechnical system that must consider both technical and human aspects. In the context of maritime cyber resilience, it is important to note that when developing strategies for maritime cybersecurity, one cannot only consider technical security measures and ignore human error, as this does not adhere to good cybersecurity practice. To address this, this study aims to identify the navigating officers’ responsibilities for ECDIS cybersecurity and find the human error probabilities during these tasks via the SLIM-based human reliability analysis method. The outputs of this study provide an insight for industrial policies and best practices, in ECDIS cybersecurity risk management in terms of the behavioural and cultural aspects of shipping.

Type
Research Article
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution, and reproduction in any medium, provided the original work is properly cited.
Copyright
Copyright © The Author(s), 2022. Published by Cambridge University Press on behalf of The Royal Institute of Navigation

1. Introduction

The high level of digitalisation and connectivity in the maritime sector makes the cybersecurity issue a significant one. Specifically, the cyber environment of ships contain interconnected networks of both Information Technologies (IT) and Operational Technologies (OT) (Gunes et al., Reference Gunes, Kayisoglu and Bolat2021). This cyber space onboard provide services, information, business and social functions. To ensure the continued security and safety of these functions, there is an agreement that human capabilities and human strengths, when working together, are key for the management of cyber vulnerabilities. Therefore, the human element is key in establishing and maintaining robust cybersecurity and in preventing cyber-attacks (White Paper, 2022).

Electronic Chart Display and Information System (ECDIS) is one critical asset, which integrates IT and OT, in the navigational bridge onboard ships (Kristic et al., Reference Kristic, ŽuŁkin, Brčic and Car2021). It is an electronic device including software, hardware, data, and a human–machine interface (Weintrit, Reference Weintrit2009). One requirement for ECDIS to be used onboard comes from the International Convention for the Safety of Life at Sea (SOLAS). This requirement states that all ships include the same or more functionality compared to paper navigational charts and main navigation specifications, published by International Maritime Organization (IMO) (IMO, 2006). According to on-board fulfilment requirements, ECDISs must be type approved; this requires that software must be maintained, including up-to-date Electronic Navigational Charts (ENCs), and it must be installed with adequate backup arrangements for navigation safety (IHO, 2017, 2018; IMO, 2009, 2017a). ECDIS is integrated with a ship's sensors, satellite position fixing and other advanced electronic databases, including chart information. According to the IMO performance standards involving the configuration of ECDIS, the information of position, heading and speed are received from a global positioning system (GPS), which is the one of the global navigation satellite systems (GNSS), gyrocompass, and speed log, respectively, which are the mandatory systems integrated with ECDIS. In addition, ECDIS merges and synthesises the information received from other systems, such as radio detection and ranging (RADAR), automatic identification system (AIS), autopilot, and voyage data recorder (VDR) for safety of ship and environment. This communication uses a NMEA (National Marine Electronics Association; NMEA0183 Standard for Interfacing Marine Electronic Devices) interface (Weintrit, Reference Weintrit2009; Svilicic et al., Reference Svilicic, Kamahara, Celic and Bolmsten2019b). ECDIS systems must also be kept updated according to the product specifications and presentation library of the International Hydrographic Organization (IHO) ENC by considering the latest version of them (OCIMF, 2020). Updating the ENC in time also procures creditable performance for ECDIS and carries a main precondition for safe of navigation (Weintrit, Reference Weintrit2009).

Although there are apparent benefits, as mentioned, with the integration of several operational navigation equipment with ECDIS, the risk of cyber-attacks on the ECDIS system or its integrated items emerges. Because ECDIS and its typical back arrangement have high-level connectivity and digitalisation, they are an excellent environment for cyber-security threats associated with the distribution of malicious code (Svilicic et al., Reference Svilicic, Kristić, Žuškin and Brčić2020). For this reason, cyber-attacks aimed directly at ECDIS or its integrated items should be considered as a critical issue to ensure safety of life, property and environment (Kristic et al., Reference Kristic, ŽuŁkin, Brčic and Car2021). Moreover, OCIMF (2020) stated that ECDIS involves three category of vulnerabilities: (i) human factors and machine interface, (ii) ECDIS navigation procedures and practices, (iii) ECDIS hardware, software and ENC data. In this context, the issue of cybersecurity of ECDIS must consider the perspective of human factors, as well. Since ECDIS-related cyber incidents or any digital errors can occur due to people's over-reliance on technology, along with disrupted main navigational skills and weak situational awareness (Nielsen, Reference Nielsen2016; BrčićSrđan et al., Reference BrčićSrđan, Žuškin, Valčic and Francic2018; Tsimplis and Papadas, Reference Tsimplis and Papadas2019), the human factor is important to consider.

Navigating officers and masters onboard a ships have various responsibilities over ECDIS operations. A list of key operations include, but are not limited to: setting up and maintaining display, operational use of electronic charts, route planning, route monitoring, alarm handling, manual correction of a ship's position and motion parameters, records in the ship's log, chart updating, operational use of ECDIS with radar/ARPA connected, operational use of ECDIS where AIS connected, operational warnings, their benefits and limitations, and system operational tests (Weintrit, Reference Weintrit2009). These tasks are not performed by the navigating officers or masters according to a hierarchical order. The performance of these tasks depends on the necessities of navigation, international maintenance requirements, intervals of charts updating, manufacturers’ technical bulletins, and similar issues.

As these tasks are carried out by navigating officers and masters, cyber-attacks or incidents derived from human error commission/omission can occur. For instance, a malicious software can infiltrate all onboard navigation systems via USB drive plugged into the ECDIS by a navigating officer, if the navigating officer does not use specially designated and pre-scanned USBs. As a result of this, ECDIS sensor data can be manipulated with unreliable information displayed to the officer of the watch, some false alerts can appear, and the system can be critically slowed down (PaSea, 2018). Similarly, during ENC updating on the internet without any checking security of system, unauthorised logical access can be used to attack ECDIS and all navigation systems (Svilicic et al., Reference Svilicic, Rudan, Jugović and Zec2019d). Additionally, if navigating officers do not take any precautions against physical access to ECDIS, unauthorised physical access could be possible. Therefore, files, routes or other significant information can be changed, deleted or send to the unwanted third parties.

Based on these facts, it can be said that ECDIS consists of two strengths, the first of which is the design leading to vulnerabilities to possible malicious attacks and human error. These strengths of ECDIS provides several opportunities, such as safety of navigation and maritime situational awareness. The weaknesses of ECDIS can result in various threats, which can create dangers for the safety of navigation, maritime surveillance and responsibilities of navigating officers for decision-making situations.

To prevent these threats, ensuring and improving cyber resilience onboard, IMO adopted MSC.428 resolution, which is Marine Cyber Risk Management in Security Management System (SMS) (IMO, 2017b) and Guidelines on Cyber Risk Management (MSC-FAL 1/Circ.3) (IMO, 2017c). These documents required that all ship's safety management system should include cyber risks and ways to protect ships and ship systems from cyber-attacks in the context of International Safety Management Code (ISM) until 1 January 2021. In accordance with these requirements, although cyber-security clauses including ECDIS already exist in the Safety Management Manuals (SMM) onboard ships, it is seen that detailed cyber responsibilities and procedures as systematically for general cyber spaces onboard ships including ECDIS have not been encountered. On the other hand, in maritime cybersecurity, several available standards, policies and guidelines, such as International Electrotechnical Commission (IEC) 61162-1, IEC 61162-2, IEC 27005, IEC 61162-450, NIST framework, the guidelines on cybersecurity onboard ships, and code of practice cybersecurity for ships, only present the recommendations from the technical aspects, such as from the perspective of physical, application, network, data security and requirements of usage of security (BS EN IEC 61162-1, 1996; BS EN IEC 61162-2, 1999; BS ISO-IEC 27005, 2011; ICS and other organizations, 2016; BS EN IEC 61162-450, 2018; NIST, 2020). However, not all these resources focus on cyber responsibilities in maritime in an effective way. By considering these aspects, the tasks of navigating officers related to bridge navigation and communication assets, specifically ECDIS operations, have must be reshaped according to cyber-security requirements for IT and OT cyber onboard, since cybersecurity in maritime is a comparatively new touchstone for safe navigation at sea. In other words, the tasks of navigating officers have evolved to not only consider to requirements of operations, but to also consider cyber-security measurements regarding related operations. However, these duties, which are blended with the requirements of cybersecurity on ships, cannot be implemented effectively and in a standard way by all officers on board because of customary navigation culture, with overreliance on technology and the problem of adaptation to the fulfilment of technological measures with tasks, the lack of training (standard or tailored), awareness, experience.

Most cybersecurity incidents or attacks against ships are the result of human error. As a result of cyber-attacks, collisions, grounding or sinking can cause serious harm to life, property and the environment. This harm can be caused due to access hackers obtain to monitoring and control systems onboard and manipulation of navigation system. Other outcomes include financial loss, extortion and damage to a company's reputation, for example if sensitive information onboard is stolen. To prevent such calamities, it is critical for navigating officers to have the ability and performance skills to complete at a reasonable speed an efficient ECDIS operation while considering cyber-security measurements. At this point, the expectation from navigating officers is to perform their tasks without any navigational, operational or technical malfunctions. Hence, determining the probability of human error for each ECDIS-related task during navigational and communication operations on a vessel while considering cybersecurity is critical to preventing these losses.

This study aims to identify the responsibilities of navigating officers and other related human factors relating to ECDIS cybersecurity and to determine the human error probabilities during these tasks via the success likelihood index method (SLIM)-based human reliability analysis (HRA) method. SLIM is a one of the expert-based HRA methods that is used to overcome existing lack of statistical, historical or recorded data related to a particular task. Due to the lack of historical data to understand human errors for ECDIS cyber-security tasks onboard ships, the SLIM method is considered in this study.

To the authors’ best knowledge, a study that focuses on human error probabilities for ECDIS cybersecurity does not exist within existing literature. There are some academic studies that only include ECDIS cyber vulnerabilities and mitigation options from a technical perspective (Tam and Jones, Reference Tam and Jones2018, Reference Tam and Jones2019; Mraković and Vojinović, Reference Mraković and Vojinović2019; Svilicic et al., Reference Svilicic, Kamahara, Celic and Bolmsten2019b, Reference Svilicic, Rudan, Frančić and Doričić2019c) or involve suggestions on the importance of human factor and behaviour for maritime cybersecurity (DNV-GL, 2016; Hareide et al., Reference Hareide, Josok, Lund, Ostnes and Helkala2018; Lagouvardou, Reference Lagouvardou2018; Tam and Jones, Reference Tam and Jones2018; Hanzu-Pazara et al., Reference Hanzu-Pazara, Raicu and Zagan2019; Larsen and Lund, Reference Larsen and Lund2021; Pseftelis et al., Reference Pseftelis, Chondrokoukis and Candidate2021). The current state-of-the-art studies in the literature and their key points are listed in Table 1.

Table 1. Related studies in the literature

Contrary to the state-of-the-art literature, this paper focused on finding human error probabilities for ECDIS cybersecurity and, accordingly, developing strategies for related parts in maritime activities different from other studies.

All in all, the output of this study provides insights for the navigating officers, shipping companies managers or owners, ECDIS manufacturers, marine insurers and other related stakeholders in terms of improving cybersecurity within safety management manuals by considering bridge officers’ cyber responsibilities, especially for ECDIS. This may include ECDIS cyber management plans under the ISM system of ships, designing information sharing policies and process between ECDIS manufacturers, shipping company, and ship, considering cyber responsibilities for ECDIS by marine insurers, and placing them in newly developed maritime cyber insurance policies. In this context, it is important to develop a comprehensive formed task list in order to ensure cyber resilience of all cyber spaces onboard a ship in the context of SMS.

The paper's design is as follows. Section 1 discusses the motivation and brief literature reviewing human reliability analysis and ECDIS cybersecurity in the maritime. The method process of this study is explained in Section 2. Section 3 shows the model application applied to ECDIS cybersecurity. The conclusions and contributions are given in Section 4. Finally, the acronyms and nomenclature within this paper is presented in Table 2 for easy reading.

Table 2. Nomenclature

2. Methodology

2.1 Success likelihood index method (SLIM)

Embrey et al. (Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984a, Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984b) developed SLIM for measuring the probability of human error that emerges during the practice of a particular task. SLIM is an expert-based HRA method. Expert-based HRA methodologies are used when there is a lack of statistical, historical or recorded data related to a particular task. This is the case for many cyber-related tasks, as cybersecurity is a very recent issue with a small set of historical data.

The most commonly used expert-based HRA methodologies are SLIM, the technique of human error rate prediction (THERP), and the human error assessment and reduction technique (HEART) (Kayisoglu et al., Reference Kayisoglu, Gunes and Besikci2022). These are all the first-generation methods developed for HRA. Therefore, they only consider the skill-based and rule-based activities, and their disadvantage is not to consider other factors, such as organisational factors, the impact of context and errors of commission (Norazahar, Reference Norazahar2020). However, their critical advantages shine when applied to operational, maintenance and incident analysis for specific tasks or scenarios. In this case, human behaviour is based on skills, procedures and knowledge. In particular, SLIM depends on knowledge of experts that is a group for arguing specific tasks, and performance-shaping factors (PSFs) affect the success of tasks. The framework of the PSF is created on human factors performance based on expert opinion. The algorithm of SLIM is easy to apply and allows fast human error probability (HEP) for any specific task or scenario (Calixto, Reference Calixto2016). In this context, the most useful method can be considered as SLIM for understanding overall HEP of any particular task sequence, which have not been tacked before and lack data, and their PSF effects. Moreover, at the end of SLIM method, the possibility of errors which can happen in a specific operation can be decreased by developing and arranging PSFs within the system that procured an improvement in all safety levels. Contrary to this, the THERP method is more useful for understanding an event tree model and complex graphic representation for complex tasks. However, it omits the human PSFs, which impacts human error positively or negatively. HEART has nominal human unreliability table, standard generic tasks and error-producing condition table. Accordingly, experts have the option to choose proper generalised generic tasks and related error producing conditions from tables for any specific task instead of developing such items themselves. Moreover, it is a straightforward technique for solving and performing natural human reliability analysis cases thanks to the standard tables. However, the specific task sometimes cannot be fit with generic tasks in the table. It is more suitable for petrochemical and nuclear industries. It must be developed and changed for appropriate use in other fields.

Conversely, in this study, SLIM method is selected to determine the HEP values of the tasks related to ECDIS cybersecurity because of the advantages, such as applicability for specific tasks, usability in case of lack of data due to expert opinion and arrangement of the system safety level with PSF functions.

2.2 Process of the SLIM method

Kayisoglu et al. (Reference Kayisoglu, Gunes and Besikci2022) presented a flow diagram as shown in Figure 1 for the SLIM method in their study, which handles the HEP for bunkering operation in the maritime. Accordingly, the SLIM method is performed according to the process shown in Figure 1.

Figure 1. Flow diagram for SLIM (Kayisoglu et al., Reference Kayisoglu, Gunes and Besikci2022)

The benefits and advantages of the step-by-step SLIM roadmap are as follows (Kayisoglu et al., Reference Kayisoglu, Gunes and Besikci2022). The problem statement step procures a perspective from the author while determining the PSFs for the tasks in the SLIM method. In addition to defining and explicating the tasks, experts must provide great perspective and systematic approaches when weighting and rating the PSFs for each tasks provided. Moreover, defined PSFs functionally help specify operational achievements and strategic and financial activities to achieve success in any operation or task. Although expert judgement includes subjectivity, experienced and skilled experts do possess enough knowledge for the considered tasks and procure high-level information to overcome inaccessible and restrictive data for the relevant scenario. The weighting of PSFs for a specific scenario provides an initial sight about the criticality of the performance factors for the success of an operation as a whole. Procuring an initial view for the success of an operation is one of the advantages of the SLIM approach over other existing HRA methods. In the step of rating PSFs for each task, each task in an operation is evaluated specifically to define the steps where errors may occur. Hence, the risks related to the operation are systematically decreased by identifying strategic targets and taking required measures specific to each step. After achieving the SLI values and HEP values that are derived from SLI values, inter-judgement, sensitivity and rating analyses through analysis of variance (ANOVA) tests are carried out to check reliability and validity of the considered case study.

3. Case study on human error probability for ECDIS cyber security

3.1 Problem statement

As mentioned in the introduction, ECDIS is an electronic device that includes software, hardware, data and a human–machine interface. While ECDIS has a wide range of strengths for navigational officers in terms of design intent and functions, it also has a range of weaknesses, such as entry points that can be exploited by attackers across IT and OT configuration systems, communication interfaces with other cyber–physical systems onboard ships and human error. It is necessary to focus on the human aspect, especially navigating officers onboard a ship, when considering maritime cyber threats, as they interact with these systems and their vulnerabilities. Digital technologies must properly introduced on the bridge onboard a ship in a safe and efficient way, because if they are managed poorly, this can damage the safety of the ship and main root of maritime knowledge, skills and expertise. In this regard, the steps mentioned in the flow diagram of the SLIM in Figure 1 are followed and enforced to find human error probabilities for ECDIS cybersecurity specifically in this study.

3.2 Data collection

According to Figure 1, experts are identified according to having adequate and effective training, reasonable experience, and high level and related position on the considering tasks, scenarios or operation.

In this study, the considering tasks are related to the ECDIS operations pursued cybersecurity. These tasks are performed by navigation officers and controlled by a master mariner onboard. Five such experts evaluate the tasks and PSFs in this study. All of them are deck officers and masters onboard their ships. According to the International Convention on Standards of Training, Certification and Watch keeping for Seafarers (STCW) (Safety4Sea, 2019), all our experts have to have taken qualified training and have at least one year of sea experience before becoming a deck officer; therefore these experts do have a high level experience in the sea as a deck officer or master. In addition, these experts are in key positions for performing ECDIS navigation practices on the bridge. In terms of ECDIS cybersecurity, as mentioned before, IMO introduced an amendment of MSC.428 resolution, which is ‘Marine Cyber Risk Management in SMS onboard ships,’ in 2017. Pursuant to this change, all ships must consider cybersecurity to be implemented in their SMS by 2021. For this reason, since 2017, shipping companies have to show the necessary care for the crew they have sent to their ships, especially the navigational officers and masters, to create an infrastructure on cybersecurity, because since the beginning of the 2021, all ships are inspected by the port state controls according to cybersecurity strategies stated in their SMSs. This is a regulatory indicator that masters and navigating officers should have cybersecurity awareness onboard ships.

Detailed demographic information about this study's experts is provided in Table 3. The reliability and validity of the obtained data and performed analysis are ensured in the reliability analysis section. According to the reliability analysis, the obtained data is reliable and applicable for the analysis.

Table 3. Demographic information of experts

For obtaining the weighting and rating of PSFs data that impacts ECDIS task cybersecurity, questionnaires were prepared with two sections. One section obtains expert rating scores of the PSFs in the view of considering each specific tasks about ECDIS cybersecurity. The other one obtains weights of the PSFs in view of the overall operation of ECDIS cybersecurity. The scoring of experts is performed by using a 1–9 point scale in both questionnaires, as SLIM requires (Embrey et al., Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984a, Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984b). The obtained data are firstly extended to 0–100 scale by multiplying 10 as requirements of the original SLIM, then used in equations standardised for SLIM in the following sections.

3.3. Tasks identification

According to the original SLIM, tasks or error modes related to operation are identified by discussion with a panel of experts, as well as by performing other steps of SLIM, such as identifying, weighting and rating PSFs as one panel (Embrey et al., Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984a, Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984b). However, in this study, the tasks related with ECDIS are determined by referencing the guide of operational handbook for ECDIS (Weintrit, Reference Weintrit2009), and OCIMF's guide related to the recommendations on usage of ECDIS and preventing incidents (OCIMF, 2020). Then, these determined ECDIS tasks are integrated with the cybersecurity by referencing ECDIS cyber incidents (Svilicic et al., Reference Svilicic, Brčić, Žuškin and Kalebić2019a, Reference Svilicic, Rudan, Jugović and Zec2019d, Reference Svilicic, Kristić, Žuškin and Brčić2020; Karahalios, Reference Karahalios2020; Kristic et al., Reference Kristic, ŽuŁkin, Brčic and Car2021; Tam et al., Reference Tam, Hopcraft, Moara-Nkwe, Misas, Andrews, Harish, Giménez, Crichton and Jones2022), various recommended international IT and OT cybersecurity standards for maritime such as International Organization for Standardization (ISO), IEC standards and NIST framework (ISO/IEC, 2010; BSI, 2011, 2017, 2018, 2021; Cichonski et al., Reference Cichonski, Millar, Grance and Scarfone2012), and other codes of cybersecurity for ships (ICS and other organizations, 2016; Boyes and Isbell, Reference Boyes and Isbell2017; IACS, 2020). Moreover, the developed final ECDIS tasks integrated with cybersecurity are checked by referencing a safety management manual of a shipping company, which is required by the IMO Maritime Safety Committee (MSC) according to the Resolution MSC.428(98) ‘Maritime Cyber Risk Management in Safety Management Systems’ (IMO, 2017a). The resolution requires that maritime cyber risks are appropriately considered in existing safety management systems (as defined in the ISM Code), as of 1 January 2021. Although there are similar tasks on ECDIS cybersecurity in the safety management manual of the shipping company, as one example, it is understood that there is a need for further development of these manuals, which must be applied on ships with the additional tasks developed within the scope of this study. As a result, in Table 4, the ECDIS cybersecurity tasks are considered in four different specific categories: ‘relationship between ECDIS manufacturers and navigating officers for ENC and ECDIS software update’, ‘responsibilities of navigating officers and company officers for ENC and ECDIS software updates’, ‘navigation responsibilities of deck officers on ECDIS’ and ‘company and vessel officers’ awareness on cybersecurity technical requirements onboard’.

Table 4. Tasks for ECDIS cybersecurity

3.4 Identification of performance-shaping factors (PSFs)

The term ‘performance-shaping factor’ (PSF) stands for the items that impact the success of considered tasks or operation. In other words, PSFs provide information on preventing human errors/faults for any specific tasks or operation (Embrey et al., Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984a, Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984b). For identifying PSFs for ECDIS cybersecurity, this study used research in the literature, guidelines for ships cybersecurity, international IT and OT standards.

According to Kristic et al. (Reference Kristic, ŽuŁkin, Brčic and Car2021), for deck officers, ensuring the safety of the ship always takes precedence over meeting operational commitments and carrying out the ship's routine. In this context, their primary responsibility is navigation. Navigation onboard involves a range of several processes, which some of them are carried out in a specific order, some almost constantly, some randomly, and some rarely. The lack of established rules regarding the optimum use of navigation systems and techniques adds to the difficulty of this issue. Optimum use of navigation systems depends on the type of ship, the quality of navigational equipment on board, and the experience and skills of the seafarer (Bolat and Kayişoğlu, Reference Bolat and Kayişoğlu2019).

At the same time, deck officers take the necessary measures to oversee all facilities of the procurement. For this purpose, they and other members on the bridge team ensure that they have appropriate training and preparedness for training and that all competence and systems are adequate. They should also ensure that all digital charts and publications are updated with the information provided by the Notice to Mariners (NtMs) and that all essential equipment is correctly outfitted. Since a ship has a dynamic lifecycle at sea and in ports, it is highly possible to make serious mistakes while performing a voyage plan. To plan a route carefully, the crew must use the necessary charts and monitor the ship's position for a comprehensive voyage, all of which are signs of a professional seafarer (ECE/TRANS/SC, 2013).

To ensure the safety of ships, any uncertainty about the location of the ship poses a hazard and should be cleared without delay. The best way to do this is by cross-checking data to avoid ambiguity around ship positions by utilizing all available tools and constantly controlling various sources of location information. The cross-checking method consists in using many different navigational techniques to maintain both operational controls and capabilities that may be required in an emergency situation. Any single navigational system creates a single point of failure; therefore, they must be backed up by another source to ensure the ship's safety (Nielsen, Reference Nielsen2016).

On the other hand, Kristic et al. (Reference Kristic, ŽuŁkin, Brčic and Car2021) has highlighted the overreliance of the seafarer on ECDIS and the equipment it is tied to. Overreliance on ECDIS and other IT and OT assets create cyber-vulnerabilities in terms of human behaviour. The MSC has stated that unsecure tendencies of the seafarers, such as overreliance to technologic information onboard, is preventable not only training, but also with proper navigational culture, rigorous ships procedures, safety management rules, information sharing about related topics and awareness (IMO, 2017b).

All of the state-of-the-art guidelines, codes and regulations (ICS and other organizations, 2016; Boyes and Isbell, Reference Boyes and Isbell2017; PaSea, 2018; National Cybersecurity Centre, 2020) mention that these navigation tasks are performed on ECDIS or other aids to navigation equipment by considering cybersecurity measurements. These measurements are required both technical measurements onboard and having perception of the usage of these technical measurements. Accordingly, a cautious attitude about a potential cyber incident occurring suddenly, with the perception of cyber-attacks against ECDIS and other assets, engenders an attitude of waiting on alarm and good decision-making skills for safe navigation and secure systems. In addition, adequate time availability with these skills for error detection and correction also prevents human errors in the case of any cyber-attacks against ECDIS.

In the context of the references and after the controls by experts, the PSFs are specified as in Table 5.

Table 5. Performance shaping factors for ECDIS cybersecurity

3.5 Weighting of PSFs

According to SLIM, after determining the tasks related to ECDIS cybersecurity and defining PSFs, experts weight the PSFs by considering which factor is more important to achieve the navigating officers the overall ECDIS cybersecurity tasks without any failure.

After experts give weighted PSFs scores of individually for the success of overall ECDIS cybersecurity tasks, according to the SLIM method, the arithmetic means of the individual weights for each PSFs and their normalised weights are calculated, as shown in Table 6. This step performed takes into consideration the process of aggregating the individual expert opinions to obtain an overall HEP value for each human task (Embrey et al., Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984b). The process requires that the arithmetic means of the individual weights and individual ratings of the PSFs are calculated and then used for gain an overall success likelihood index (SLI).

Table 6. Normalised weights

3.6 Rating of PSFs

Experts give scores for PSFs by taking each task into consideration separately. Like in Section 3.4, all individual expert ratings are extended to a scale of 0–100. After that, the arithmetic means of the individual experts’ ratings are calculated for achieving the overall SLI, as in Table 7.

Table 7. Means of PSFs ratings

3.7 Calculation of success likelihood index (SLI)

According to SLIM (Embrey et al., Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984a, Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984b), the SLI values are obtained according to Equation (1) for each task:

(1)\begin{equation}\textrm{SLI} = \left\{ {\mathop \sum \limits_{i = 1}^n \textrm{Weigh}{\textrm{t}_i} \times \textrm{Ratin}{\textrm{g}_i}\textrm{|}i = \# \textrm{PSF}} \right\}\end{equation}

The resulting SLI values for each task are presented in Table 8. The multiplications of weight values with rating values (Weight  × Rating) are demonstrated in the related column (see ‘Product’ column) in Table 8 for each task. In the last column, all product values for each task are summed up and SLI values for each task are achieved.

Table 8. SLI values of tasks

3.8 Transformation SLI to HEP

According to SLIM (Embrey et al., Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984a, Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984b), the HEP value is obtained by using SLI values and anchor values (a and b) corresponding to each task in accordance with the Equation (2):

(2)\begin{equation}\log \,\textrm{of}\ \textrm{Probability}\,\textrm{of}\,\textrm{Success} = aSLI + b\end{equation}

The value obtained from Equation (2) represents the success probability of a considered task, and it is this value that allows us to determine the human error probability of each task. The value of success probability should be subtracted from 1 after the anti-log of it is taken. The constant values of ‘a’ and ‘b’ in Equation (2) are the special items to SLIM and they are calculated by using SLIs of any two tasks related to considered operation and their HEP values, which have already been known or established before (Embrey et al., Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984a). For ECDIS cybersecurity, the two tasks, the HEP values of which are already known, are not encountered in the literature or from any risk assessment that have made by ships or in the shipping company. Hence, in this study, the absolute probability judgement method is used to find ‘a’ and ‘b’ endpoints for each of the four different task categories developed for ECDIS cybersecurity. The method of absolute probability judgement provides data for most rare-event operations or scenarios when the data frequency may not exist by the way of absolute probability judgments of experts on the best and worst cases for the evaluated operation (Kayisoglu et al., Reference Kayisoglu, Gunes and Besikci2022).

In this study, experts focus on the four different categories of ECDIS cybersecurity and estimate the human error probability for the best and worst cases in these categories separately by taking into consideration the situation where PSFs are as bad as possible. These are the situations which navigating officers must have in order to successfully complete ECDIS cybersecurity missions, and vice versa. After obtaining HEP values of the two reference tasks for each task category thanks to the absolute probability judgement method, the values of ‘a’ and ‘b'are found by using ‘0’ and ‘100’ values as SLI values in Equation (2) for the worst- and best-case scenarios, respectively. The obtained reference HEP values are supposed to be reasonable and reliable for the ECDIS cybersecurity tasks when trusting to experts’ experience and knowledge as in all research sourced by expert opinion (Embrey et al., Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984a, Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984b; He et al., Reference He, Wang, Shen and Huang2008; Hakam and Ratriwardhani, Reference Hakam and Ratriwardhani2013) and examining the cyber incidents or attacks against ECDIS in literature. Estimated HEP values for best and worst cases regarding ECDIS cybersecurity and constant values derived from them are detailed in Table 9. In Table 10, unknown HEP values for evaluated tasks are obtained by using SLI values in Table 8 and ‘a’ and ‘b’ constant values in Table 9 in the Equation (2).

Table 9. Estimated HEP for the best and worst case of ECDIS cyber-security task categories

Table 10. Human error probability for each tasks

3.9 Reliability analyses

According to Embrey et al.'s sustainable method requirements, the reliability analyses of SLIM specifically include analysis of rating data, sensitivity analysis and inter-judge consistency analysis. These reliability analyses are carried out through the tests of two-way ANOVA by considering intended purposes (Embrey et al., Reference Embrey, Humphreys, Rosa, Kirwan and Rea1984a).

The aim of the ANOVA tests is to compare the means of two groups or more. It is a collection of statistical models used to analyse differences between means and their correlated variation between and within groups. ANOVA is based on the law of total variance, in which the observed variance in a given variable is divided into components attributable to different sources of variation (Emerson, Reference Emerson2017). According to the ANOVA test, when the significance values (p) in ANOVA test results are less than 0 · 05, it means that considered dependent variable significantly differ between considered independent variables or groups (Gamage and Weerahandi, Reference Gamage and Weerahandi1998).

In this study, for analysis of rating data, the intended purpose is that the PSF ratings significantly become different between PSF categories and evaluated tasks. With the sensitivity analysis, it is aimed that weight values significantly become different between PSF categories, but they do not significantly become different between tasks. For inter-judge consistency analysis, it is given that individual log HEP values significantly become different between evaluated tasks, but they do not significantly become different between experts. If these purposes are confirmed by the analysis results, it is ensured that the obtained data for this study is valid and SLIM analysis results are reliable.

In this context, the results of ANOVA tests for each reliability analysis are presented in Tables 1113. According to the inter-judge consistency analysis in Table 11, the results showed that individual log HEP values significantly become different between evaluated tasks (p < 0 · 05) but they do not significantly become different between experts (p > 0 · 05). The results of inter-judge consistency analysis are consistent with intended purpose in this study.

Table 11. ANOVA results for inter-judge consistency

a R Squared = 0 · 777 (Adjusted R Squared = 0 · 774).

The interclass correlation coefficient, which states the mean correlation between the experts’ opinions, is obtained via Equation (3). ‘F’ value in Equation (3) represents ‘F’ value of Expert in Table 9 and ‘n’ shows number of experts. The result of Equation (3) (0 · 998 – the closer it is to ‘1’, the higher-level agreement between experts it is) evidences very high-level agreement between experts:

(3)\begin{equation}r = \frac{{F - 1}}{{F + ({n + 1} )}} = \frac{{579 - 1}}{{579 + ({5 + 1} )}} = 0\;.\;988\end{equation}

According to the sensitivity analysis in Table 12, weight values significantly become different between PSF categories (p < 0 · 05) but they do not significantly become different between tasks (p > 0 · 05). These results are in line with the desired expectations of this study. In addition, recommendations are designed in the findings and discussions by interrupting the weights of PSF categories to identify which PSFs have the greatest effect on the probability of success or failure about ECDIS cybersecurity. This is a significant advantage of SLIM over other approaches.

Table 12. ANOVA results for sensitivity analysis

a R Squared = .010 (Adjusted R Squared = .006)

According to the rating analysis in Table 13, PSF ratings significantly become different between PSF categories and evaluated tasks (p < 0 · 05). The result of rating analyses are consistent with the intended purpose in this study. Accordingly, the mean of the PSF ratings can be approved as a measure of the overall quality of the ECDIS cybersecurity with regard to the tasks under consideration.

Table 13. ANOVA results for rating analysis

a R Squared = .046 (Adjusted R Squared = .042)

In accordance with the results of the reliability analysis, the obtained data from experts for this study is valid and the results of SLIM analysis are reliable and commendable.

3.10 Findings and discussions

The results of SLIM analyses in Table 10, Figures 2 and 3 allow us better to understand the human error probabilities for ECDIS cybersecurity and the impact of PSFs on ECDIS cybersecurity, respectively.

Figure 2. HEP graph for ECDIS cybersecurity

Figure 3. The impact assessment of PSFs on ECDIS cybersecurity

Among the task categories considered for ECDIS cybersecurity the fourth category, which includes tasks related to company and vessel officers awareness on cybersecurity technical requirements onboard, has the highest possibility for failure. In this category, navigating officers mostly fall into error related to performing removal of data and software licenses or any inconsistent equipment related to ECDIS, including storage media. At the same time, all tasks in the fourth category involve very close failure probabilities. Regarding tasks in the fourth category, navigating officers should consciously restrict access to software on the ECDIS computer, including the operating system, by password protection for ensuring cybersecurity. Additionally, they should only be provided with access to the network and network services that they have been specifically authorised to use for ECDIS cybersecurity. They should not remove any ECDIS equipment (including information and software) from the bridge or the ship without prior approval. Finally, crew should be aware that remote and wireless access to ECDIS should be controlled by using an encryption protocols. These tasks include critical level of failure possibilities according to the analysis results. To prevent these failures, navigating officers should have and understand policies, regulations, standards, checklists and code of practices related to ECDIS cybersecurity, according to the analysis results as detailed in Table 7. Additionally, these technical security processes and procedures measures (e.g. software/hardware, internet security systems, alarms of warning messages) related to ECDIS cybersecurity should have a place in the Safety Management System (SMS) and Safety Management Manuals, including detailed professional prepared cybersecurity clauses, especially ECDIS cybersecurity. Essentially, navigating officers should have constant awareness of ECDIS cybersecurity and then adequate ECDIS cybersecurity education and training in order to search and understand these process and procedures in the SMS and other sources and perform them onboard a ship in the scope of SMS.

In accordance with the analysis results, the second highest failure probabilities for ECDIS cybersecurity relates to the responsibilities of navigating officers and company officers to update ENC and ECDIS software . The most likely failure in this context is either ENC updates are not sent by the manufacturer on a secure program or this secure program does not address in the whitelisting application of the ship or company. Whitelisting has capability of defining the secure items, applications, network and access points, such as whitelisted access control for portable storage devices including limiting documents to write, read and operate on removable medias; only on given permission for the use of encrypted devices and the use of drives with particular serial numbers. For this reason, whitelisting is one important technical measures that should be established and adopted by companies to ensure all ship cybersecurity, including ECDIS. Then, unclosed ECDIS ports for external portable drives such as USB are also a highly possible failure onboard a ship. In addition to this, navigating officers generally do not use unique and pre-scanned USB drives for receiving the ENC updates from the program and uploading them to the ECDIS, and the USBs used by navigating officers are not to be recorded in the whitelisting application of the ship or company. Such mitigations are useful for tasks in the fourth category, for avoiding these failures. Firstly, the requirements related to closing of ECDIS ports should take place in SMS onboard a ship, and ENC and ECDIS software updates protocols and communications should be secured, which includes strategies such as whitelisting. If ECDIS ports are not closed, the requirement of usage of unique and pre-scanned USB drives recorded in the whitelisting application should be involved in SMS, as well. Navigating officers should have the adequate education to understand related technical measures and awareness of these requirements to provide ECDIS cybersecurity.

When evaluating the tasks in the third category, all tasks have a very similar probability of failure. This category consists of navigation responsibilities for navigating officers on ECDIS along with on the cybersecurity. After navigating officers make and save the passage plan in ECDIS, they do not generally ensure the availability, integrity and confidentiality of it by making sure no deletions, changes or lack of information can be made to the passage plan. Additionally, to understand the integrity of the passage plan, officers should maintain the correct level of zoom on ECDIS charts to ensure safety critical information is displayed on ECDIS. However, according to the results, this has one of the highest possible failure in this category. Moreover, before taking over a navigational watch, the incoming navigating officers generally error by not confirming the ECDIS configuration against the passage plan requirements, such as safety settings, chart display and alarm system management. The outbound officer does not highlight any changes made to the ECIDS configuration, which is except for the passage plan parameters, if there is one. Before that, they should use cross-checking methods with such as radar or visual fix to confirm the accuracy of information displayed on the ECDIS. However, although this task is a low-probability error in this category, it is still an important task that may not be performed and may affect other tasks. Finally, following a cyber-attack and especially when approaching any waypoint or important area (e.g. canal, TSS, narrow channel, pilot station, etc), officers can err by not rechecking the passage plan. According to these results, the most essential factors affecting these failures are effective usage of ECDIS in compliance with good navigation practice along with the perception knowledge of ECDIS cybersecurity. In this scope, navigating officers should have good navigation culture and behaviour integrated with cybersecurity and keep themselves on the alarm that cyber-attack can occur suddenly and at any moment.

Finally, among the task categories considered for ECDIS cybersecurity, the first category, which includes tasks related to relationship between ECDIS manufacturers and navigating officers for ENC and ECDIS software update, has the lowest possibility for failure. In this category, the highest possible failure is that if manufacturers detect any inconsistency in ECDIS performance, they do not generally issue technical bulletins with mitigating measures to all ship owners/operators who manage ships equipped with their systems to highlight issues and to correct inconsistencies. When this happens, the masters and navigating officers cannot be aware of the issues and cannot develop any protective measures for future plans, and most importantly they cannot determine whether the technical issue is derived from a cyber-attack or not. This is followed by that a navigating officer not able to detect the future errors of ECDIS manufacturers’ safety bulletins or software upgrades or future inconsistencies in ECDIS-related data or functionality the next time. To prevent these failures, it is recommended that cyber information-sharing policies between persons, company, ship and other stakeholders in the maritime sector, such as ECDIS manufacturers, should be developed and adopted by related parties and should be addressed in the SMS of shipping companies.

All in all, evaluating overall ECDIS cybersecurity, the most important factors to ensure effective cybersecurity for it are (i) effective usage of ECDIS in compliance with good navigation practice along with cybersecurity perception; (ii) adequate ECDIS cybersecurity training; (iii) developing technical security measures, and addressed them in safety management system of shipping companies; and (iv) developing cyber information sharing between related stakeholders in the maritime sector.

4. Conclusion

In maritime cybersecurity, several available policies and procedures, standards and guidelines only put forward frameworks for the physical, application, network, data security and requirements of usage aspects of security. They comprise essential components for entire maritime cybersecurity official strategies in terms of technical mitigations. However, the human factor is not always specified clearly as a part of defence strategies. We argue that the human factor and management of the associated human strengths and vulnerabilities should instead be fully incorporated and acknowledge the key components in sociotechnical systems in the maritime field, to create robust cybersecurity protection, prevention, organisational integrity and safety assurance.

In this study, the contributions on determining the human error probabilities related to ECDIS cybersecurity and on developing strategies for ECDIS cybersecurity onboard ships are presented to support this concept, and propose solutions based on the sociotechnical vulnerabilities identified.

The analysis results provides to enable practical anchorage to not only navigating officers for enhancing their perceptions of risks related to their responsibilities on ECDIS cybersecurity, but also to shipping company managers and ECDIS manufacturers for improving the design of safety critical systems and exist procedures for ECDIS cyber space. By considering the human reliability analysis results as the pre-emptive approaches, this study can provide an insight for industrial policies, guidelines and best practices in ECDIS cybersecurity risk management in terms of the behavioural and cultural aspects of shipping. More specifically, ship owners or managers can change available cyber policy, procedures and checklists in accordance with the International Safety Management (ISM) Code to improve effectiveness. This would form new ECDIS cybersecurity rules and crewmember roles and responsibilities. Accordingly, ship managers can develop effective drills and trainings about ECDIS cybersecurity tailored for crew members onboard ships which is in their service intended for measure the level of their own crews’ human error possibilities and improve the critical level of human errors obtained in this study.

These results are relevant because human factors and poor processes cause an extensive part of security breaches in all sectors. If the sector ignores this, marine insurers are may struggle to improve the extensive scope of maritime cyber insurance specifically due to: (i) the unknown nature of cyber risk; (ii) lack of actuarial data; (iii) improving and changing continually technology; and (iv) uncertainties responsibilities and roles of related stakeholders such as crew members, managers or owners in the shipping companies for cyber spaces onboard a ship. If shipping companies owners or managers can specify the roles and responsibilities of crewmembers under the safety management system and manual, this also provides pivot points for marine insurers to define the claims in any case of cyber-attack, especially for ECDIS.

This study also demonstrated that ECDIS manufacturers should make further developments for engaging navigating officers onboard and shipping company managers in all elements of a process, such as publishing technical bulletins, updating operating systems of ECDIS and detecting any inconsistencies in ECDIS functionality. In addition, they can consider making familiarisation and orientation of ECDIS workstation for adding navigating officers’ capabilities to ECDIS cybersecurity tasks by considering human errors in this study. These further developments requires in-depth knowledge of the technical aspect of cybersecurity and ECDIS technology. Therefore, in order to understand and apply the technical requirements of ECDIS cybersecurity, they should have well-designed education and training involving ECDIS dynamics, regulations, standards, policies, and law on the ECDIS cybersecurity, and responsibilities and liabilities for ECDIS cybersecurity. In addition, this study highlights that, currently, navigating officers onboard a ship should integrate their navigation skills and culture with the cybersecurity requirements and attitudes.

The insights obtained in this study help and to assist next-generation of responsible human factors for ECDIS cybersecurity in three key points: (i) they should be aware of ECDIS cyber risks, have adequate skills and qualifications for preventing these risks, be familiar with the procedures, levels of authorisation, and physical security barriers, and be well trained in risk response. They can be such as restricting access to network, software and operating system on the ECDIS by password protection, whitelisting, closing ECDIS ports for external portable drives, using pre-scanned USBs, integrating the navigational skills with cybersecurity perception, to be alert on for cyber-attacks and cross-checking navigational information received other cyber-physical system; (ii) SMSs and manuals, which are used to protect the operations and put in place the necessary procedures and actions to maintain the security of cyber systems onboard ships, should be re-designed to develop understanding and awareness of key aspects of cybersecurity, especially ECDIS cybersecurity, by considering points mentioned in (i) articles; (iii) marine insurers should take into consideration ECDIS cybersecurity responsibilities and liabilities of crew members as a checklist in order to identify claims of sides in any case of cyber-attack against ECDIS.

Acknowledgements

We would like to thank all participants for providing data.

Funding statement

This study is supported by The Scientific and Technological Research Council of Turkey (TÜBİTAK) - 2214-A – International Research Fellowship Programme for PhD Students [REF: 53325897-115.02-152823]. This study is also supported by University of Plymouth, Cyber-SHIP Lab.

Author contributions

The authors confirm contribution to the paper as follows: study conception and design: G. Kayisoglu, P. Bolat; data collection: G. Kayisoglu; analysis and interpretation of results: G. Kayisoglu, P. Bolat, K. Tam; draft manuscript preparation: G. Kayisoglu. All authors reviewed the results and approved the final version of the manuscript.

Competing interests

None.

References

Bolat, P. and Kayişoğlu, G. (2019). Antecedents and consequences of cybersecurity awareness: a case study for Turkish maritime sector. Journal of Eta Maritime Science (JEMS), 7(4), 44360.Google Scholar
Boyes, H. and Isbell, R. (2017). Code of Practice: Cybersecurity for Ships. IET Standards, Department for Transport, and Defence Science & Technology Laboratory (UK).Google Scholar
BrčićSrđan, D., Žuškin, S., Valčic, S. and Francic, V. (2018). Implementation of the ECDIS System: AN OOW Perspective as an Integral Part of Educational Improvement. IAMU 2018: Annual General Assembly (AGA) of the International Association of Maritime Universities (IAMU), 121128.Google Scholar
BS EN IEC 61162-1. (1996). Maritime navigation and radiocommunication equipment and systems – Digital interfaces – BS EN IEC 61162-1-1996.Google Scholar
BS EN IEC 61162-2. (1999). Maritime navigation and radiocommunication equipment and systems – Digital interfaces – BS EN IEC 61162-2-1999.Google Scholar
BS EN IEC 61162-450. (2018). Maritime navigation and radiocommunication equipment and systems – Digital interfaces – BS EN IEC 61162-450:2018.Google Scholar
BS EN IEC 63154. (2021). Maritime navigation and radiocommunication equipment and systems – Cybersecurity – General requirements, methods of testing and required test results – BS EN IEC 63154:2021.Google Scholar
BS EN ISO-IEC 27001. (2017). Information technology – Security techniques-Information security management systems-Requirements – BS EN ISO-IEC 27001-2017.Google Scholar
BSI ISO-IEC 61162-460. (2018). Maritime navigation and radiocommunication equipment and systems – Digital interfaces – BS EN IEC 61162-460-2018+A1-2020.Google Scholar
BS ISO-IEC 27005. (2011). Information technology – Security techniques-Information security risk managemnet – BS ISO-IEC 27005-2011.Google Scholar
Calixto, E. (2016). Human reliability analysis. In Gas and Oil Reliability Engineering, pp. 471552. Elsevier. doi:10.1016/B978-0-12-805427-7.00005-1CrossRefGoogle Scholar
Cichonski, P., Millar, T., Grance, T. and Scarfone, K. (2012). Computer security incident handling guide : Recommendations of the national institute of standards and technology. NIST Special Publication, 800–61, 79.Google Scholar
DNV-GL. (2016). Cybersecurity Resilience Management for Ships and Mobile Offshore Units in Operation. DNV-GL Corporate Report, DNVGL-RP-0(September), 186.Google Scholar
ECE/TRANS/SC. (2013). Recommendation on Electronic Chart Display and Information System for Inland Navigation (Inland ECDIS) (Issue Resolution No. 48-Revison 2).Google Scholar
Embrey, D. E., Humphreys, P., Rosa, E. A., Kirwan, B. and Rea, K. (1984a). SLIM-MAUD: an Approach to Assessing Human Error Probabilities Using Structured Expert Judgment. Volume I. Overview of SLIM-MAUD. In NUREG/CR-3518-Vol.1; BNL-NUREG-51716-Vol.1 ON: DE84012380.Google Scholar
Embrey, D. E., Humphreys, P., Rosa, E. A., Kirwan, B. and Rea, K. (1984b). SLIM-MAUD: an Approach to Assessing Human Error Probabilities Using Structured Expert Judgment. Volume II. Detailed analysis of the technical issues. Brookhaven National Lab., Upton, NY, USA.Google Scholar
Emerson, R. W. (2017). ANOVA and t-tests. Journal of Visual Impairment and Blindness, 111(2), 193196. doi:10.1177/0145482(1711100214CrossRefGoogle Scholar
Evans, M., He, Y., Maglaras, L., Yevseyeva, I. and Janicke, H. (2019). Evaluating information security core human error causes IS-CHEC) technique in public sector and comparison with the private sector. International Journal of Medical Informatics, 127, 109119. doi:10.1016/j.ijmedinf.2019.04.019CrossRefGoogle ScholarPubMed
Gamage, J. and Weerahandi, S. (1998). Size performance of some tests in one-way ANOVA. Communications in Statistics Part B: Simulation and Computation, 27(3), 625640. doi:10.1080/03610919808813500CrossRefGoogle Scholar
Gunes, B., Kayisoglu, G. and Bolat, P. (2021). Cybersecurity risk assessment for seaports: a case study of a container port. Computers and Security, 103), doi:10.1016/j.cose.2021.102196CrossRefGoogle Scholar
Hakam, M. and Ratriwardhani, R. A. (2013). Identifikasi bahaya pada pekerjaan grinding di sebuah perusahaan manufaktur dengan menggunakan pendekatan succes likelihood index methode Indonesia. Seminar Nasional Manajemen Teknologi XIX, November, 1–8.Google Scholar
Hanzu-Pazara, R., Raicu, G. and Zagan, R. (2019). The impact of human behaviour on cybersecurity of the maritime systems. Advanced Engineering Forum, 34, 267274. doi:10.4028/www.scientific.net/aef.34.267CrossRefGoogle Scholar
Hareide, O. S., Josok, O., Lund, M. S., Ostnes, R. and Helkala, K. (2018). Enhancing navigator competence by demonstrating maritime cybersecurity. Journal of Navigation, 71(5), 10251039. doi:10.1017/S0373463318000164CrossRefGoogle Scholar
He, X., Wang, Y., Shen, Z. and Huang, X. (2008). A simplified CREAM prospective quantification process and its application. Reliability Engineering and System Safety, 93(2), 298306. doi:10.1016/j.ress.2006.10.026CrossRefGoogle Scholar
IACS. (2020). Recommendation on Cyber Resilience. International Association of Classification Societies, Recommendation No. 166, 157.Google Scholar
ICS and other organizations. (2016). The Guidelines on Cybersecurity Onboard Ships.Google Scholar
International Hydrographic Organization. (2017). Information on IHO Standards related to ENC and ECDIS. Version 1.1.Google Scholar
International Hydrographic Organization. (2018). Current IHO ECDIS and ENC Standards.Google Scholar
International Maritime Organization. (2009). MSC.282(86): Adoption of Amendments to the International Convention for the Safety Of Life At Sea, 1974. Annex 1.Google Scholar
International Maritime Organization. (2006). MSC.232(82): Adoption of the Revised Performance Standards for Electronic Chart Display and Information Systems (ECDIS).Google Scholar
International Maritime Organization. (2017a). Resolution MSC.1/Circ.1503/Rev.1, ECDIS – Guidance for Good Practice.Google Scholar
International Maritime Organization. (2017b). IMO Resolution MSC.428 (98). p. 428.Google Scholar
International Maritime Organization. (2017c). Guidelines on Cyber Risk Management- . MSC-FAL 1/Circ.3.Google Scholar
ISO/IEC. (2010). International Standard ISO/IEC Information Technology – Security Techniques – Network Security – Threats, Design Techniques and Control - ISO/IEC 27033-3 (Vol. 2010).Google Scholar
Karahalios, H. (2020). Appraisal of a ship's cybersecurity efficiency: the case of piracy. Journal of Transportation Security, 13(3–4), 179201. doi:10.1007/s12198-020-00223-1CrossRefGoogle Scholar
Kayisoglu, G., Gunes, B. and Besikci, E. B. (2022). SLIM based methodology for human error probability calculation of bunker spills in maritime operations. Reliability Engineering and System Safety, 217, 108052. doi:10.1016/j.ress.2021.108052CrossRefGoogle Scholar
Kristic, M., ŽuŁkin, S., Brčic, D. and Car, M. (2021). Overreliance on ECDIS technology: a challenge for safe navigation. TransNav, the International Journal on Marine Navigation and Safety of Sea Transportation, 15(2), 277287. doi:10.12716/1001.15.02.02CrossRefGoogle Scholar
Lagouvardou, S. (2018). Maritime cybersecurity: concepts, problems and models. Master thesis (issue July).Google Scholar
Larsen, M. H. and Lund, M. S. (2021). A maritime perspective on cyber risk perception: A systematic literature review. IEEE Access. doi: 10.1109/ACCESS.2021.3122433CrossRefGoogle Scholar
Mraković, I. and Vojinović, R. (2019). Maritime cybersecurity analysis – how to reduce threats? Transactions on Maritime Science, 8(1), 132139. doi:10.7225/toms.v08.n01.013CrossRefGoogle Scholar
National Cybersecurity Centre. (2020). Cyber essentials: Requirements for IT infrastructure. August, 1–12.Google Scholar
Nielsen, M. R. (2016). How A Ship'S Bridge Knows its Position – ECDIS Assisted Accidents From A Contemporary Human Factors Perspective. Lund University.Google Scholar
NIST. (2020). NIST Risk Managment Framework. In Information Technology Laboratort Computer Security Resource Center.Google Scholar
Norazahar, N. B. (2020). Human Factors Risk Assessment. In Methods in Chemical Process Safety, pp. 289302. doi:10.1016/bs.mcps.2020.02.005CrossRefGoogle Scholar
OCIMF. (2020). Recommendations-on-Usage-of-ECDIS-and-Preventing-Incidents, p. 32.Google Scholar
PaSea. (2018). Secure your Ecdis – prevent a cyber attack. DCP Circular 07-2018.Google Scholar
Pollock, T. (2017). Reducing Human Error in Cyber Security Using the Human Factors Analysis Classification System (HFACS). KSU Proceedings on Cybersecurity Education, Research and Practice, Event 2.Google Scholar
Pseftelis, T., Chondrokoukis, G. and Candidate, P. D. (2021). A study about the role of the human factor in maritime cybersecurity. SPOUDAI Journal of Economics and Business, 71(1), 5572.Google Scholar
Safety4Sea. (2019). STCW Convention: General Requirements for Officers. Maritime Knowledge, Seafarers. https://safety4sea.com/cm-stcw-convention-general-requirements-for-officers/Google Scholar
Svilicic, B., Brčić, D., Žuškin, S. and Kalebić, D. (2019a). Raising awareness on cybersecurity of ecdis. TransNav, 13(1), 231236. doi:10.12716/1001.13.01.24CrossRefGoogle Scholar
Svilicic, B., Kamahara, J., Celic, J. and Bolmsten, J. (2019b). Assessing ship cyber risks: A framework and case study of ECDIS security. WMU Journal of Maritime Affairs, 18(3), 509520. doi:10.1007/s13437-019-00183-xCrossRefGoogle Scholar
Svilicic, B., Rudan, I., Frančić, V. and Doričić, M. (2019c). Shipboard ECDIS cybersecurity: Third-party component threats. Pomorstvo, 33(2), 176180. doi:10.31217/p.33.2.7CrossRefGoogle Scholar
Svilicic, B., Rudan, I., Jugović, A. and Zec, D. (2019d). A study on cybersecurity threats in a shipboard integrated navigational system. Journal of Marine Science and Engineering, 7(10), 364. doi:10.3390/jmse7100364CrossRefGoogle Scholar
Svilicic, B., Kristić, M., Žuškin, S. and Brčić, D. (2020). Paperless ship navigation: Cyber security weaknesses. Journal of Transportation Security, 13(3–4), 203214. doi:10.1007/s12198-020-00222-2CrossRefGoogle Scholar
Tam, K. and Jones, K. D. (2018). Maritime cybersecurity policy: the scope and impact of evolving technology on international shipping. Journal of Cyber Policy, 3(2), 147164. doi:10.1080/23738871.2018.1513053CrossRefGoogle Scholar
Tam, K. and Jones, K. (2019). MaCRA: a model-based framework for maritime cyber-risk assessment. WMU Journal of Maritime Affairs, 18(1), 129163. doi:10.1007/s13437-019-00162-2CrossRefGoogle Scholar
Tam, K., Hopcraft, R., Moara-Nkwe, K., Misas, J. P., Andrews, W., Harish, A. V., Giménez, P., Crichton, T. and Jones, K. (2022). Case study of a cyber-physical attack affecting port and ship operational safety. Journal of Transportation Technologies, 12(01), 127. doi:10.4236/jtts.2022.121001CrossRefGoogle Scholar
Tsimplis, M. and Papadas, S. (2019). Information technology in navigation: problems in legal implementation and liability. Journal of Navigation, 72(04), 833849. doi:10.1017/S0373463318001030CrossRefGoogle Scholar
Version, D., Kujala, P. and Hirdaris, S. (2020). Prediction Model of Human Error Probability in Autonomous Cargo Ships. Proceedings of the International Seminar on Safety and Security of Autonomous Vessels (ISSAV) and European STAMP Workshop and Conference (ESWC),Vol. 2019(2019), pp. 110124. doi:10.2478/9788395669606-010CrossRefGoogle Scholar
Vistiaho, P. (2017). Maritime cybersecurity incident data reporting for autonomous ships. Master thesis (issue November), Tampere University of Technology.Google Scholar
Weintrit, A. (2009). The electronic chart display and information system (ECDIS): An operational handbook. In The Electronic Chart Display and Information System (ECDIS): AN Operational Handbook. doi:10.1201/9781439847640CrossRefGoogle Scholar
White Paper. (2022 ). Human Affected Cybersecurity (HACS) Framework. Chartered Institute of Ergonomics and Human Factors.Google Scholar
Figure 0

Table 1. Related studies in the literature

Figure 1

Table 2. Nomenclature

Figure 2

Figure 1. Flow diagram for SLIM (Kayisoglu et al., 2022)

Figure 3

Table 3. Demographic information of experts

Figure 4

Table 4. Tasks for ECDIS cybersecurity

Figure 5

Table 5. Performance shaping factors for ECDIS cybersecurity

Figure 6

Table 6. Normalised weights

Figure 7

Table 7. Means of PSFs ratings

Figure 8

Table 8. SLI values of tasks

Figure 9

Table 9. Estimated HEP for the best and worst case of ECDIS cyber-security task categories

Figure 10

Table 10. Human error probability for each tasks

Figure 11

Table 11. ANOVA results for inter-judge consistency

Figure 12

Table 12. ANOVA results for sensitivity analysis

Figure 13

Table 13. ANOVA results for rating analysis

Figure 14

Figure 2. HEP graph for ECDIS cybersecurity

Figure 15

Figure 3. The impact assessment of PSFs on ECDIS cybersecurity